News & Analysis as of

Business Organization Science, Computers & Technology Consumer Protection

Read Business Organization updates, alerts, news, and legal analysis from leading lawyers and law firms:

Is Your Business Insured Against A Cyber Attack?

by Partridge Snow & Hahn LLP on

Your business has insurance coverage for flood and fire damage. You are protected if an employee gets into a car accident. But are you covered for a cyber attack?...more

Proposition 65 Legislative Changes Likely “Lack Merit”

by Morrison & Foerster LLP on

On October 5, 2017, California Governor Jerry Brown signed Assembly Bill 1583 into law. It was promoted as a means of reducing frivolous Proposition 65 (Prop 65) lawsuits, but, as discussed below, it is doubtful that it will...more

NIST Small Business Cybersecurity Act Passes in the House

by Morgan Lewis on

On October 11, 2017, the House of Representatives passed bill H.R. 2105, the NIST Small Business Cybersecurity Act (NIST Act), which would require the US Department of Commerce’s National Institute of Standards and Technology...more

Privacy Tip #110 – Resources for Small Businesses to Stay Informed about Cyber Threats

The Federal Trade Commission (FTC) has concentrated on small businesses this year with the launch of www.FTC.gov/SmallBusiness , which provides data security awareness information to small businesses. The site includes...more

Implementing a Policy Review to Ensure You Are Protected Under The Computer Fraud and Abuse Act, Part 2: How to Conduct Your...

by Hinshaw & Culbertson LLP on

In Part 1 of this series, we discussed the Computer Fraud and Abuse Act (“CFAA”) and situations that are readily prohibited by the CFAA, such as when current or former employees gain access to an employer's databases or files...more

NERC Proposes to Reduce Cybersecurity Risks in CIP Supply Chains

by Morgan Lewis on

The proposed Reliability Standards focus on vulnerabilities in vendor products and services and would regulate the utility procurement process....more

Illinois Geolocation Privacy Protection Act Vetoed By Governor Rauner

by King & Spalding on

The Geolocation Privacy Protection Act, which passed the Illinois Senate and General Assembly earlier this year, was vetoed by Illinois Governor Bruce Rauner on September 22, 2017. The bill (HB-3449) was the first of its kind...more

Equifax Mea Culpa: Too Little, Too Late?

Equifax Inc.’s interim CEO, Paulino do Rego Barros Jr., issued the company’s second public apology this morning for the massive data breach that has affected as many as 143 million U.S. consumers....more

Common Cybersecurity Mistakes

by Nexsen Pruet, PLLC on

Data breaches result in massive economic and legal consequences for organizations. Ginni Rometty, IBM Corp.’s Chairman, President, and CEO stated last year...more

Financial Services Weekly News - September 2017

by Goodwin on

Editor's Note - The Roundup has been on hiatus since its August 23 edition. Since then, we have had the misfortune to witness the widespread devastation inflicted by Hurricanes Harvey and Irma. Our hearts go out to the...more

New Cybersecurity Report Asks the Private Sector to Join Forces with the Government

by McDermott Will & Emery on

The government is continuing to ask for more help from the private sector to defend against cyber attacks. The National Infrastructure Advisory Council (NIAC) recently published a report discussing current cyber threats and...more

SEC Focuses on Initial Coin Offerings: Tokens May Be Securities Under Federal Securities Laws

by Dechert LLP on

The U.S. Securities and Exchange Commission (SEC) has recently taken several actions to make clear that it is focused on and actively monitoring the rapidly growing market for so-called “token sales” or “initial coin...more

With Big Data Comes Big Responsibility

by NAVEX Global on

Big data refers to the huge and ever-growing volume of data organizations mine to uncover opportunities for building deeper customer relationships and developing new strategies for growth. Gartner describes big data as having...more

Proposed Changes to Singapore Personal Data Protection Act 2012

by Morgan Lewis on

The Personal Data Protection Commission is holding a public consultation exercise on its proposed changes to the Personal Data Protection Act 2012....more

High Security: How to Minimize Marijuana Data Risks

As we’ve blogged in the past, the cannabis industry is particularly susceptible to cyberattacks. With threats like a federal crackdown and workplace drug testing, customers have a vested interest in keeping their information...more

Passwords Remain Important for Data Security, FTC Reminds Businesses

For the most recent installment in the Federal Trade Commission’s “Stick with Security” series, the agency’s blog post focused on passwords....more

Set Sensible Limits on Data Access, FTC Explains

In its third post in the “Stick with Security” series, the Federal Trade Commission (FTC) suggested that access to sensitive data should be sensibly limited....more

OCIE Provides Insight into Issues Identified in Recent Cybersecurity Sweep

by Morrison & Foerster LLP on

The National Exam Program of the SEC’s Office of Compliance Inspections and Examinations (OCIE) recently published its observations from the second generation of its Cybersecurity Initiative. It reported overall improvement...more

Patching Up Your Information Security Review

by Morgan Lewis on

In light of recent significant ransomware cyberattacks such as the one that originated in Ukraine and quickly spread to affect hundreds of thousands of computers in more than 150 countries, we wanted to provide a few pointers...more

Corporate Law & Governance Update - August 2017

by McDermott Will & Emery on

A new article published in the Harvard Business Review confirms that the preservation of reputation continues to be a significant motivating concern for individual board members. This is a factor that should be taken...more

And So It Begins: The First DFS Transition Period Comes to an End August 28

by King & Spalding on

In September 2016, the New York Department of Financial Services (“DFS”) introduced the first draft of its cybersecurity regulation, which is now in a position to lead a new trend in industry-specific cybersecurity...more

Warning: New Proposition 65 Warning Regulations Taking Effect

by Morrison & Foerster LLP on

A year from now, dramatic changes to California’s Proposition 65 warning regulations take full effect. The new regulations (formally published by the State in August 2016) significantly alter the “safe harbor” rules for...more

EPA Issues Three Final TSCA Framework Rules

by Morgan Lewis on

The final rules establish procedures to identify high-risk chemicals, conduct risk evaluations, and reset the TSCA Inventory. The US Environmental Protection Agency (EPA) recently issued three final framework rules...more

The Evolution of the President’s Commission to Enhance National Cyber Security

by NAVEX Global on

Through a presidential commission and executive order, the presidencies of the former and current administrations have been linked in a shared effort to bolster our nation’s cyber security. ...more

The General Data Protection Regulation – Top 10 Considerations

by Goodwin on

The clock is ticking and in less than a year the European Union (EU) General Data Protection Regulation (GDPR) will be in full force. Companies should be getting ready now in order to avoid hefty fines for violations (up to...more

152 Results
|
View per page
Page: of 7
Cybersecurity

Follow Business Organization Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.