News & Analysis as of

Cybersecurity Risk Management Breach Notification Rule

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
BCLP

Cyber - More Than Just Breach Response

BCLP on

The vast majority of commentary and public advice concerning data breaches surround, deservedly, the breach itself. This focus is only natural; it is the breach itself that requires victims to bring enormous resources to bear...more

Jackson Lewis P.C.

2024 Wrap-Up of the Workplace Privacy, Data Management & Security Report

Jackson Lewis P.C. on

As the year comes to a close here are some of the highlights from the Workplace Privacy, Data Management & Security Report with our most popular topics and posts from 2024. Expanding State Privacy Laws- This year saw a...more

Constangy, Brooks, Smith & Prophete, LLP

NY-licensed financial services companies must harden incident response plans, improve breach readiness by November 1

New York’s Cybersecurity Regulation continues its phased roll-out on November 1, when licensed financial services companies face a host of new requirements aimed at bolstering breach readiness and improving their ability to...more

Akin Gump Strauss Hauer & Feld LLP

SEC Publishes Five C&DIs Covering Cybersecurity Incident Disclosures Pursuant to Item 1.05 of Form 8-K

On June 24, 2024, the U.S. Securities and Exchange Commission (SEC) published five new Form 8-K Compliance and Disclosure Interpretations (C&DIs) expanding the agency’s interpretations of cybersecurity incident disclosures...more

Alston & Bird

The Digital Download – Alston & Bird’s Privacy & Data Security Newsletter – November 2023

Alston & Bird on

Publications and Advisories - November 13, 2023 – Kathleen Benway, Kate Hanniford, Amy Mushahwar, Kim Peretti, and Lance Taubin published “Privacy, Cyber & Data Strategy Advisory: FTC Approved New Data Breach Notification...more

Morrison & Foerster LLP

Litigation Readiness: Seven Things to Keep in Mind

Morrison & Foerster LLP on

Data breach class actions continue to rise, following almost inevitably from nearly every major security incident. Here are seven things in-house counsel can do to prepare for that anticipated litigation....more

Jackson Lewis P.C.

Importance of Protecting Employee Information as Privacy and Cybersecurity Laws Proliferate

Jackson Lewis P.C. on

Most human resources professionals are concerned about the privacy and security of the vast amounts of personal information they manage. This article discusses steps to consider taking against the challenges. Deluge of...more

Foley & Lardner LLP

HIPAA Breaches and Compliance: Key Findings & Lessons Learned from OCR’s Reports to Congress

Foley & Lardner LLP on

The Office of Civil Rights (OCR) at the U.S. Department of Health and Human Services (HHS) recently submitted two annual reports to Congress setting forth a summary of complaints and breaches reported to the OCR during...more

Jackson Lewis P.C.

Healthcare Companies Seek to Manage Risk of Ransomware Attacks, According to Report

Jackson Lewis P.C. on

Healthcare companies continue to face increased risks of ransomware attacks on their operations. According to the recently released BD Cybersecurity Annual Report for 2021, such attacks are also increasingly sophisticated....more

Hogan Lovells

EU seeks to bolster cybersecurity regulation with the introduction of NIS 2.0

Hogan Lovells on

On 16 December 2020, the EU released its proposed revisions to the existing Directive 2016/1148 on the security of network and information systems (NIS2)....more

Mitchell, Williams, Selig, Gates & Woodyard,...

Hospitals In The Crosshairs: Managing Cybersecurity Risk (2)

In our last article, we showed you how to evaluate where your organization sits on the landscape of readiness and preparedness. In this concluding article, we identify concrete steps you can immediately employ to move your...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Hospitals In The Crosshairs: Managing Cybersecurity Risk (Part 1)

From the recent headline-grabbing attacks on hospitals and municipalities, the specter of cybersecurity threats looms large. As a result, spending on cybersecurity initiatives is expected to reach $96 billion this year....more

Seyfarth Shaw LLP

Can The Health Care Industry Protect Itself from Cyberattacks?

Seyfarth Shaw LLP on

The health care industry is racing to adopt cutting-edge technology to provide patients with the best treatment possible at the lowest possible cost. ...more

Snell & Wilmer

The EU General Data Protection Regulation

Snell & Wilmer on

This Friday is the deadline for General Data Protection Regulation (“GDPR”), yet many companies are still in the process of planning for compliance. Companies not able to meet the deadline may want to consider,...more

Nossaman LLP

GDPR COMPLIANCE DEADLINE IS MAY 25, 2018: Privacy Regulation is a Moving Target

Nossaman LLP on

Worldwide, companies are scrambling to meet the May 25th deadline to comply with the European Union’s General Data Protection Regulation (GDPR). For companies with physical operations in an EU member state, this deadline is...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Are You Ready for GDPR?

Personal data is currency in the new world, and while the United States uses a sectoral approach to data privacy, the European Union (EU) treats privacy as a fundamental right of its citizens. Therefore, where U.S....more

Ladas & Parry LLP

Data Protection Impact Assessment

Ladas & Parry LLP on

Article 35 of the GDPR provides for Data Protection Impact Assessments (DPIA). According to Article 35(1) a DPIA is required when “the processing [of data] is likely to result in a high risk to the rights and freedoms of...more

Hogan Lovells

The General Data Protection Regulation (GDPR): action plan for pension scheme trustees - (revised March 2018)

Hogan Lovells on

The European General Data Protection Regulation (GDPR) will apply directly in the UK from 25 May 2018, and will make some fundamental changes to the current requirements surrounding data protection. Key areas of change...more

Ladas & Parry LLP

The European Union General Data Protection Regulation (GDPR): An Introduction

Ladas & Parry LLP on

The European Union (EU) General Data Protection Regulation (GDPR 2016/679) will take effect on May 25, 2018. This regulation provides general guidance on what is needed for compliance, however many policies and procedures are...more

Fenwick & West LLP

Equifax Breach: 3 Immediate Steps Leading Companies Are Taking To Respond

Fenwick & West LLP on

Equifax, one of the three nationwide credit bureaus that track and rate the financial history of consumers, announced in September that it had suffered a data breach exposing personal information of up to 143 million...more

Mintz - Privacy & Cybersecurity Viewpoints

Data Breaches Will Cost Yahoo and Verizon Long After Sale

Five Things You (and Your M&A Diligence Team) Should Know - Recently it was announced that Verizon would pay $350 million less than it had been prepared to pay previously for Yahoo as a result of data breaches that...more

Bennett Jones LLP

Cybersecurity: 2017 Report & 2016 Reflections - What Businesses and Boards Need to Know

Bennett Jones LLP on

In 2016, cybersecurity continued to grow as a primary business risk for companies worldwide. Data breaches continued to escalate both in number and magnitude and the landscape of legal and regulatory liability evolved and...more

Foley & Lardner LLP

Cybersecurity Update - July 2015

Foley & Lardner LLP on

Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more

23 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide