News & Analysis as of

Breach Notification Rule Third-Party Data Breach

Sands Anderson PC

Who’s Responsible When a Third-Party Vendor Is Compromised?

Sands Anderson PC on

Recently, we had the opportunity to advise some clients who worked with a third-party vendor that maintained custody of personal information pertaining to our clients’ respective end users.  The vendor suffered a data breach...more

Jackson Lewis P.C.

The RIPTA Data Breach May Provide Valuable Lessons About Data Collection and Retention

Jackson Lewis P.C. on

Efforts to secure systems and data from a cyberattack often focus on measures such as multifactor authentication (MFA), endpoint monitoring solutions, antivirus protections, and role-based access management controls, and for...more

Zelle  LLP

Employee Health Information: Separate and Secure

Zelle LLP on

There are several reasons an employer might have employee health information, ranging from the results of a pre-employment physical to the contents of a request for FMLA leave to what’s written in a health provider’s note...more

Foley & Lardner LLP

California Amends Definition of Personal Identifiable Information and Breach Notification Content Requirements

Foley & Lardner LLP on

On October 6, 2015, California Governor Jerry Brown signed into law several changes to California’s Data Breach Notification Statute. The law, as amended, adds additional categories of information into the definition of...more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide