News & Analysis as of

Data Security Security Breach

Fenwick & West LLP

Cybersecurity Disclosure is Under the SEC Spotlight: Is Your Company Ready?

Fenwick & West LLP on

Cyber incidents are among the fastest-growing existential threats to publicly traded companies. More than a technical headache, breaches can materially impact your bottom line—and the mere news of an incident can send stocks...more

Porter Hedges LLP

Compliance Challenges Arising from the Use of ChatGPT and Artificial Intelligence

Porter Hedges LLP on

On November 30, 2022, OpenAI launched ChatGPT, and the artificial intelligence chatbot quickly became the talk of the corporate world. With over 100 million users, ChatGPT is one of the fastest growing applications of all...more

Sheppard Mullin Richter & Hampton LLP

FTC Action Against Drizly and CEO Provides Insight Into Its Security Expectations

The FTC recently took action against the online alcohol marketplace company Drizly and its CEO for alleged security failures. The case arose from a 2018 data breach which was caused – according to the FTC – by poor security...more

Buckingham, Doolittle & Burroughs, LLC

Busting Cyber Myths Part 2: I Can’t Afford Cyber Protection

In the second of a three-part series, Buckingham Data Privacy and Cybersecurity Attorney David Myers talks with Andy Jones, CEO, Fortress Security Risk Management, and Bryan Schauer, Vice President at The Schauer Group’s...more

Buckingham, Doolittle & Burroughs, LLC

Five Reasonable Ways to Maximize Data Security

As a small- to medium-size business owner, have you ever thought about what’s involved in protecting your business from a security breach? You may even be asking yourself, “What do I have to protect? I’m not a target.”...more

Foley & Lardner LLP

FTC Strengthens Data Security Requirements

Foley & Lardner LLP on

The Federal Trade Commission (FTC) recently published changes to data security requirements for financial institutions by revising the Safeguards Rule (Rule) under the Gramm-Leach-Bliley Act (GLBA). The law is designed to...more

Foley Hoag LLP - Security, Privacy and the...

Can You Still Protect Digital Forensic Reports From Discovery? It’s Getting Harder.

A data security incident will always require a technical response, and usually that technical response will come from outside experts. Those experts are hired to investigate and remediate an incident. Since data incidents...more

Bracewell LLP

SEC Gets Cyber-Serious About Disclosures

Bracewell LLP on

As cyberattacks continue to attract greater attention, the SEC has taken an additional step in its efforts to bring enforcement actions related to cyber disclosures. On June 14, the SEC announced settled charges against a...more

Jackson Lewis P.C.

DOH Employee Error Causes Breach Of COVID-19 And Other Health Data Affecting Nearly 165,000 Individuals

Jackson Lewis P.C. on

In a recent post, we highlighted the need for a privacy and cybersecurity training program, one not solely focused on spotting phishing attempts (although that is quite important as well). A primary reason, quite simply, is...more

NAVEX

Third-Party Risk Management: 5 Reasons to Monitor Cybersecurity Risk in Real Time

NAVEX on

In today’s business landscape, it is nearly impossible to work alone. You have to collaborate with clients, vendors, suppliers, specialists, and plenty of other partners all considered third parties to your organization. As a...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Data Security Threats to Consider While Employees are Working Remotely

COVID-19 has thrown many businesses into the fire of remote working. Morphisec reported in its Work-from-Home (WFH) Employee Cybersecurity Threat Index that remote working was an entirely new experience for 49 percent of...more

McDermott Will & Emery

Working Remotely in France: Protecting the Company’s IT System Through an Information Technology Code Of Conduct

The spread of Coronavirus (COVID-19) has led companies to encourage employees to work remotely. Given that cyber attackers are always ready to exploit any security vulnerability, companies should ensure that they have in...more

K2 Integrity

Tailgating – How to Avoid Physical Security Breaches

K2 Integrity on

Tailgating is a physical security breach in which an unauthorized person gains access to a building or other protected area, usually by waiting for an authorized user to open and pass through a secure entry and then following...more

Farella Braun + Martel LLP

Is your company covered by California’s new privacy law?

On Jan. 1, 2020, the California Consumer Privacy Act (CCPA), a consumer-friendly privacy law inspired by the European Union’s General Data Protection Regulation, will take effect. Originally published in the North Bay...more

Foley & Lardner LLP

71% of U.S. Federal Agencies Have Reported Cybersecurity Breaches!

Foley & Lardner LLP on

Darkreading.com reported that “Federal agencies must protect sensitive data and both thwart bad guys hunting for citizens’ private data and nation-state hackers with their own agendas — in addition to grappling with perennial...more

Mintz - Privacy & Cybersecurity Viewpoints

Alabama Becomes 50th State to Enact Data Breach Notification Law

Alabama has joined the “crazy quilt” of state data breach notification laws with the governor’s signature of the Alabama Data Breach Notification Act of 2018. Things to take note of under the Alabama law...more

Fisher Phillips

Does Being Fit Increase Your Company’s Risk of Security Breaches?

Fisher Phillips on

As we are early into the new year, for many, hope springs eternal to get in shape during 2018. Many of us wear some kind of fitness activity tracker that monitors steps, heart rate, calories, sleep patterns, etc. Recent news...more

Fisher Phillips

“GLB” and What it Means for Auto Dealers

Fisher Phillips on

Developing an information security program is good business, and for auto dealers that are considered “financial institutions” under the Gramm-Leach-Bliley Act (GLB) it is the law. As part of the GLB, the Federal Trade...more

Mintz - Privacy & Cybersecurity Viewpoints

The February 2017 Update – The Mintz Matrix

During 2016, amendments to breach notification laws in five states went into effect (California, Nebraska, Oregon, Rhode Island and Tennessee). And by the end of last year, well over twenty states had introduced or were...more

Davis Wright Tremaine LLP

[Webinar] HIPAA in the Cloud – OCR Guidance on HIPAA and Cloud Service Providers - Jan. 31st, 1:00pm ET

As the health care sector further embraces the benefits of cloud computing, numerous challenges have arisen with applying HIPAA to cloud computing services....more

Morrison & Foerster LLP - Social Media

Preparing for a Data Security Breach: Ten Important Steps to Take

Is your company prepared to respond to a data security breach? For many companies, even reading this question causes some anxiety. However, being prepared for what seems like the inevitable—a security breach—can be the...more

Mintz - Privacy & Cybersecurity Viewpoints

Summer Round-Up: Four States Bolster Data Breach Notification Laws and More Changes on the Way

As has become typical in the data security space, there was quite a bit of activity in state legislatures over the previous year concerning data breach notification statutes. Lawmakers are keenly aware of the high profile...more

McCarter & English, LLP

Academic Institutions Are Under Cyber Attack

Academia’s cyber preparedness (or lack thereof) has received less media attention than that of certain retailers and financial institutions, but nonetheless the cyber risks confronting universities are pervasive and alarming....more

Lowndes

IRS Admits Security Breach More Extensive

Lowndes on

Earlier this year, the IRS announced that identity thieves had been able to hack one of its computer databases and gain access to extremely sensitive data.  Back then, the IRS indicated that about 225,000 households had been...more

24 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide