News & Analysis as of

Data Breach Plans

GDPR's Most Frequently Asked Questions: If I Already Drafted a Privacy Policy to Comply with US Law Do I need to Change it for the...

by Bryan Cave on

The European Union’s General Data Protection Regulation (“GDPR”) is arguably the most comprehensive – and complex – data privacy regulation in the world. As companies prepare for the GDPR to go into force on May 25, 2018,...more

Who Is Watching The Watchmen?: CFTC Penalizes Registrant For Outsourced IT Security Lapses

by Bracewell LLP on

On February 12, 2018, the Commodity Futures Trading Commission (CFTC) settled charges against AMP Global Clearing LLC (AMP), a futures commission merchant (FCM), for the company’s failure to adequately supervise one of its IT...more

WARNING: The Federal Trade Commission Will Prosecute Companies Over Consumer Data Breaches - Its Recommendations Should Be Heeded

by Newmeyer & Dillion LLP on

There is no comprehensive federal statutory scheme governing breaches of consumers’ private data. However, the Federal Trade Commission (“FTC”) has a history of trying to protect consumers’ private data based on its general...more

What the EU’s New Data Regulations Mean for the US

by Cozen O'Connor on

On May 25, 2018, the European Union’s General Data Protection Regulation (GDPR) goes into effect. The GDPR was adopted in April 2016, and designed to protect the privacy rights of EU individuals through enhanced personal data...more

Planning for the Perilous Consequences of a Data Breach

by Michael Volkov on

The nightmare scenario for corporate boards and senior executives revolves around the impact of a major data breach. We have seen this first hand with Equifax, Anthem Healthcare, and Target, as prime examples. In the Equifax...more

What to Do When You Find Yourself in the Data Breach Club

by Miles & Stockbridge P.C. on

In the wake of the latest massive data breach, this one involving Equifax, more and more companies are likely wondering what they should do in the event that they are faced with a data breach that exposes the personal data of...more

McDowell v. CGI Federal Inc.: A Stark Reminder to Government Contractors of their Cybersecurity Obligations

by Hogan Lovells on

On June 1, 2017, the United States District Court for the District of Columbia issued a decision in a class action lawsuit, McDowell v. CGI Federal Inc., Civ. Action No. 15-1157 (GK) (D.D.C. 2017), which could have...more

SEC’s Cybersecurity Risk Alert Reflects Advisory Firms are Gambling with Your Data

by Burr & Forman on

In August 2017, the SEC’s Office of Compliance Inspections and Examinations issued a Cybersecurity risk alert directed at financial advisory firms. As part of the SEC’s 2014 Cybersecurity Initiative, seventy-five firms,...more

Significant changes proposed to Singapore's data protection law - 5 things you need to know

by DLA Piper on

Significant changes are proposed to Singapore's data protection law, which if passed would have a material impact on organisations' Singapore data protection compliance programmes. Here's what you need to know so you can plan...more

SEC Cybersecurity Risk Alert Emphasizes Proactive Compliance and Ongoing Vigilance

by BakerHostetler on

On August 7, 2017, the Securities and Exchange Commission (SEC) released its latest cybersecurity risk alert, detailing findings from the examination of 75 broker-dealers, investment advisers and investment companies carried...more

Avoiding Management Struggles When it Comes to Data Breaches: Part 1

by Bryan Cave on

The best way for a company to handle a data breach is to be prepared. As we discuss in our data breach readiness handbook, preparation includes, among other things, drafting an incident response plan, reviewing...more

Five Workforce Management Challenges in Unprecedented Times - Take 5 Newsletter - July 2017

by Epstein Becker & Green on

Employers across all industries are deep in the midst of exciting but unchartered and fluid times. Rapid and unforeseen technological advancements are largely responsible for this dynamic. And while there is a natural...more

Association of Corporate Counsel Issues Guidelines for Law Firm Cybersecurity Practices

by Fisher Phillips on

The Association of Corporate Counsel (ACC) recently released a set of guidelines intended to serve as a benchmark for law firm cybersecurity practices. The guidelines include information retention, return, and destruction,...more

Guidebook: Cybersecurity in the Pharma, Biotech, and Medical Devices Industries

by Foley & Lardner LLP on

As a life sciences or medical device company, it is mission critical to protect lab books, drug and clinical test data, product formulas and production processes that underlie your patents, trade secrets and know-how from...more

Identifying and Managing Corporate Risk from Internal and External Stressors

by Tucker Arensberg, P.C. on

I’ve been asked the same simple question time and time again by clients who are faced with litigation – How did this happen? Sometimes they are referring to a looming dispute over large accounts receivable, employee...more

What DFS Cybersecurity Regulation Portends for the Compliance Practitioner

by Thomas Fox on

The state of New York’s Department of Financial Services (DFS) issued the first state-level regulations on cybersecurity for financial institutions with its Cybersecurity Requirements for Financial Services Companies release,...more

New Mexico, One of the Last Holdouts, Sends Data Breach Notification Law to Governor

New Mexico is one of the few remaining states to not have a law requiring companies to notify consumers when their information is part of a data breach. This, however, might change very soon. Last Wednesday, the New Mexico...more

Sounding the Call for a Federal Data Breach Notification Law

by Robins Kaplan LLP on

For a retailer experiencing a data breach, the realization that the sensitive personal information of hundreds, thousands, or even millions of individuals has been compromised is the scenario every executive hopes to avoid....more

Friend or Foe? State Attorneys General Start to Change Their Tune on Industry & Cybersecurity

Should businesses be thought of as victims or bad actors when it comes to data breaches? State attorneys general are embracing the idea that businesses are not necessarily adversaries in the struggle to protect sensitive...more

Federal Agencies Given New Breach Response and Preparation Guidelines

by BakerHostetler on

The White House has made a step toward implementing in federal agencies some breach response best practices currently used in the private sector. On Jan. 3, the White House issued a memorandum (Memo) updating for the first...more

The White House’s Revisions to its Breach Response Policy For Federal Agencies and Departments Also Affect Contractors

by Jackson Lewis P.C. on

On January 3, 2017, the Obama Administration issued a memorandum to all executive departments and agencies setting for a comprehensive policy for handling breaches of personally identifiable information (the “Memorandum”),...more

May Old Memoranda Be Forgot: White House Issues New Memorandum on Breach Response Plan

by Kelley Drye & Warren LLP on

The White House Office of Management and Budget (“OMB”) marked the beginning of the 2017 Federal calendar year by issuing a memorandum to all agency and department heads with new guidance on breach preparation and response....more

5 Information Governance Predictions for 2017

Information is every organization’s greatest asset. It makes up intellectual property, trade secrets and many other vital corporate assets. It’s how we in corporate America conduct business. With that said, governing and...more

"Privacy & Cybersecurity Update - October 2016"

In this edition of our Privacy & Cybersecurity Update, we take a look at the FCC's new rules for broadband privacy, the FTC's new playbook for data breach response and notification, the NHTSA's voluntary guidance for...more

Data Breach Decision Points: Part 4

by Bryan Cave on

The best way for a company to handle a data breach is to be prepared. As we discuss in our data breach readiness handbook, preparation includes, among other things, drafting an incident response plan, reviewing...more

92 Results
|
View per page
Page: of 4
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.