News & Analysis as of

Science, Computers & Technology General Business Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:

Planning for Cybersecurity Risks in M&A Transactions

by K&L Gates LLP on

A glance at any media outlet shows that cyber risk is pervasive and increasing, and that virtually no company is immune to a cyber incident. Almost all companies and associations collect and store some type of data, whether...more

FTC Seeks Public Comment on Sears’ Petition to Modify Order Regarding Software Tracking Application

by Balch & Bingham LLP on

The FTC is seeking public comment on a petition by Sear’s to reopen and modify its 2009 consent order to restrict the broad definition of “tracking application”. In 2009, the FTC issued an order settling charges that Sears...more

Brexit: IoT to the rescue?

by Womble Bond Dickinson on

For retailers, speed and efficiency in supply chains are paramount. With the possibility of a "hard" or "no deal" Brexit, retailers must adapt to a new operating environment. The UK government is exploring the potential for...more

The evolving cyber insurance market: How IT companies, financial institutions, and other nontraditional players can offer cyber...

by Hogan Lovells on

In this hoganlovells.com interview, Hogan Lovells counsel Robert Fettman discusses the evolution of cyber insurance, the level of regulatory oversight applied to covered entities, and ways that noninsurance companies can...more

Defending The Business-To-Business Data Breach Lawsuit

by Ellis & Winters LLP on

Hardly a day goes by without a headline announcing that a prominent company has fallen victim to a data breach. These headlines are followed, almost inevitably, by reports of class action lawsuits filed by consumers whose...more

SEC Cyber Watch: Finally, New Guidelines for Breach Disclosures?

The U.S. Securities and Exchange Commission has signaled that it expects to issue updated guidelines on reporting cybersecurity incidents. “I think this issue is important enough, wide-ranging enough that we should tackle...more

Congress to Consider a Broad Overhaul of CFIUS

by Morrison & Foerster LLP on

On November 8, 2017, bipartisan coalitions in both the House and the Senate announced new legislation that would substantially overhaul current law governing the Committee on Foreign Investment in the United States (CFIUS)...more

SEC Enforcement Division Priorities Pertaining to Retail Investors and Cybersecurity

by Dechert LLP on

In a keynote speech to the Securities Enforcement Forum on October 26, 2017, U.S. SEC Division of Enforcement (Division) Co-Director Stephanie Avakian emphasized the protection of retail investors and cybersecurity as...more

The Data Report Episode 21: Employee Negligence Related to Data Security

by Bilzin Sumberg on

Module Six: Workplace Data Security (Part II) Litigation attorney Jay Ward discusses employee negligence related to data security in this episode of The Data Report. He highlights the importance of incorporating good data...more

Auto Dealerships And What Dealerships Can Do

by Jackson Lewis P.C. on

Automobile dealerships’ cybersecurity vulnerabilities can drive away customers, according to a survey by auditing firm Total Dealer Compliance. Automotive News said the survey of 200 dealerships in five states found...more

Informing Illinois Newsletter - November 2017

by Hinshaw & Culbertson LLP on

When Records Are Not Reasonably Accessible - The Illinois Freedom of Information Act (FOIA) was amended in December, 2014 to provide that a public body is not required to copy a public record that is published on the...more

Cybersecurity Best Practices — How General Counsel Can Prepare For The Worst

by Cozen O'Connor on

Take note GCs: The question is not if you will have to respond to a cybersecurity incident—the question is when. That was the message from speakers and panelists at the Association of Corporate Counsel’s annual meeting this...more

Privacy Shield Gets Passing Grade

In reviewing the first year of implementation of the European Union-United States Privacy Shield, the Commission to the European Parliament and the Council declared it “adequate.”...more

The First Step to GDPR Compliance Is Reintroducing Yourself to the Individual

by NAVEX Global on

The European Union’s looming new General Data Protection Regulation will be one of the biggest GRC issues companies face in 2018. Its extraterritorial reach is sweeping, potential penalties are high, and conceivable...more

FTC Provides Guidance on Reasonable Data Security Practices (Part III of III)

by Patrick Law Group, LLC on

This is the third in a series of three articles on the FTC’s Stick with Security blog. Over the past 15 years, the Federal Trade Commission (FTC) has brought more than 60 cases against companies for unfair or deceptive...more

Second Circuit Refuses to Rehear Consent Revocation Case

In the TCPA lawsuit, Reyes v. Lincoln, filed in 2015, Reyes leased a new luxury Lincoln and provided his cell phone number in his lease application. The application included a provision that Reyes “expressly consent[ed]” to...more

Business Email Compromise: What It Is and What You Can Do

by Snell & Wilmer on

Business email compromise (“BEC”) is a type of cyberattack that is increasing at an alarming pace. The U.S. Federal Bureau of Investigation estimated in a May 2017 alert that global losses due to BEC scams totaled more than...more

GDPR and personal data breaches: what, when, who, and how?

by Dechert LLP on

What is a ‘personal data breach’? First things first, what exactly is a personal data breach? The GDPR defines it as “a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised...more

Thinking About Bugs

by Reed Smith on

Security bugs may have wildly disparate paths of extermination. Some are quietly patched with code updates, while others make the national news and trigger companies’ incident response plans. Is your company aware of the data...more

The Data Report Episode 19: Data Security Regulations in China & Russia

by Bilzin Sumberg on

Module Five: International Law (Part IV) In this episode of The Data Report, Litigation attorney Jay Ward discusses two other big players in the international data security scene, Russia and China. Jay begins by discussing...more

SEC’s Most Recent Cybersecurity Move: What Registered Investment Advisors Need to Know

by Polsinelli on

As public concern over data security grows in the wake of the Equifax data breach, the U.S. Securities and Exchange Commission (SEC) is increasing its scrutiny of registered investment advisors (RIAs). In turn, RIAs should...more

Self-Driving Cars Spurred by Convergence of Traditional Manufacturers and Tech Companies, Foley Survey Finds

by Foley & Lardner LLP on

The race to self-driving cars has created new challenges and opportunities for companies, particularly automotive original equipment manufacturers that are facing competition from non-traditional sources in the technology...more

Building a Health App? Part 6: HIPAA and Other Privacy and Security Considerations

Consumers are increasingly turning to health apps for a variety of medical and wellness-related purposes. This has in turn caused greater amounts of data—including highly sensitive information—to flow through these apps....more

NAIC Insurance Data Security Model Law – States Are Next

by Carlton Fields on

On October 24, the National Association of Insurance Commissioners (NAIC) Executive (EX) Committee and Plenary granted final approval to Version 6 (with technical corrections) of the Insurance Data Security Model Law (Model)....more

Fireside chat with Elizabeth Denham at Dentons, London

by Dentons on

Elizabeth Denham, the UK Information Commissioner, spoke with Nick Graham, who leads the Dentons Privacy and Cyber Security group, at IAPP KnowledgeNet hosted by Dentons last week. The Fireside Chat was attended by more than...more

2,879 Results
|
View per page
Page: of 116
Cybersecurity

Follow Science, Computers & Technology Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.