News & Analysis as of

Cybersecurity Encryption Confidential Information

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
U.S. Legal Support

Security Best Practices for Remote Depositions in the Digital Age

U.S. Legal Support on

Trial outcomes often hinge on witness testimony. Attorneys collect much of this testimony during a formal process called a deposition. A critical component of discovery, depositions traditionally occur in law offices or...more

Bradley Arant Boult Cummings LLP

Summary Judgment: Recent HIPAA Case Emphasizes Encryption, Action on Risk Analysis - AHLA Health Information and Technology...

On June 18, 2018, the U.S. Department of Health and Human Services (“HHS”) Office for Civil Rights (“OCR”) announced that an HHS Administrative Law Judge (“ALJ”) granted summary judgment to OCR in an enforcement action...more

Zuckerman Spaeder LLP

Gone Phishing: Employer Faces Liability for Mistakenly Disclosing W-2 Forms to Scammer

Zuckerman Spaeder LLP on

Phishing. Spoofing. - These words may sound silly, but for employers, they are anything but. Phishing is the attempt to obtain sensitive electronic information—such as usernames, passwords, or financial...more

Seyfarth Shaw LLP

ABA Encourages Encryption of Emails When Transmitting Confidential Client Information

Seyfarth Shaw LLP on

In a recent formal Ethics Opinion, the American Bar Association stressed that lawyers must make reasonable efforts to prevent inadvertent or unauthorized access to confidential information relating to the representation of...more

Baker Donelson

Eight Keys to Securing Portable Devices

Baker Donelson on

Securing physical worksites and workspaces is by now old hat. We all know file cabinets should be locked, worksites secured and personal access to information monitored. Securing portable devices, however, often receives less...more

Carlton Fields

NY DFS Proposed Cybersecurity Regulations Revised and Implementation Delayed

Carlton Fields on

We previously reported on the New York Department of Financial Services’ proposed cybersecurity regulations. During the public comment period, the DFS received over 150 comments. In response, the DFS announced on December 28,...more

Kilpatrick Townsend & Stockton LLP

Top 10 Ways to Protect Your Company’s Data

You know how important data is to your business and you have been hearing about data breaches for more than a decade, but where do you find a simple, straightforward summary of how to protect your company? That is a question...more

Foley & Lardner LLP

Recent Enforcement Shows the Importance of Encrypting Mobile Devices Containing Protected Health Information

Foley & Lardner LLP on

With headlines every day announcing another release of Protected Health Information (PHI), providers are asking themselves – is there a way to protect against these breaches? Beyond improving the security of large...more

8 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide