A Closer Look at Cybersecurity Legislation and Regulations in the US and Abroad - Global Overview

WilmerHale
Contact

With interconnectivity and use of digital storage expanding, cyberthreats posed by nation states, commercial competitors, company insiders, transnational organised crime and ‘hacktivists’ are growing on a global basis. Recent high-profile data intrusions in the United States have brought particular attention to cyber espionage and cyber ‘attacks’ perpetuated by nation states, prompting data and information security to become a major geopolitical topic for relations between the United States and China, as well as several other nations. For commercial enterprises, cybersecurity is no longer a technical issue for information technology personnel; it is a high priority for corporate counsel, senior executives and company boards. In this environment, maintaining an effective corporate cybersecurity programme is likewise growing in importance.

Originally published in Getting the Deal Through - Cybersecurity 2016, by Law Business Research Ltd. - March 2016.

Please see full Chapter below for more information.

LOADING PDF: If there are any problems, click here to download the file.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© WilmerHale | Attorney Advertising

Written by:

WilmerHale
Contact
more
less

WilmerHale on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.