News & Analysis as of

Data Theft

Troutman Pepper

Understanding Access vs. Acquisition - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper on

Each of the 50 states has its own definition of what constitutes a reportable data breach. For some, it requires “unauthorized access” to personal information. For others, it requires “unauthorized acquisition.” And then,...more

ArentFox Schiff

AI in Family Offices: A Closer Look at Privacy, Confidentiality, and Fiduciary Responsibility

ArentFox Schiff on

The integration of artificial intelligence (AI) has revolutionized various industries, offering efficiency, accuracy, and convenience. In the realm of estate planning and family offices, the integration of AI technologies has...more

Alston & Bird

Top 10 Issues General Counsel Need to Know About Ransomware in 2024

Alston & Bird on

Threat actors are evolving. Our Privacy, Cyber & Data Strategy Team explains how ransomware gangs have changed their tactics and how companies can respond to the threat while navigating new scrutiny from investors and...more

K2 Integrity

Romance Scams Could Result In Risks For Organizations And Employees

K2 Integrity on

While romance might be viewed as a personal matter, an employee falling for a romance scam can have a direct impact on an organization’s bottom line. Not only could their performance suffer, but a criminal may try to steal...more

Seyfarth Shaw LLP

Cyber Strategy: HHS Weighs in on Cybersecurity in the Healthcare Industry

Seyfarth Shaw LLP on

Seyfarth Synopsis: The health care sector faces escalating cybersecurity risks given its size, technological dependence and the sensitive nature of data used therein. According to the U.S. Department of Health and Human...more

DRI

Defending Against Employee Defection: The Intersectionality of Cybersecurity and Trade Secret Protections in the Digital Age

DRI on

Cybersecurity and data protection often involve the protection of data and intellectual property (“IP”), such as trade secrets, from outside threats, but is your company prepared to defend against threats from the inside? The...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Legal Options When Bank Employees Take Confidential Data from Bank Systems

Despite bank policies, training, computer warning banners, governing laws and banking regulations, bank employees still take bank or customer data as their employment ends. They take potential or current customer lists,...more

Foodman CPAs & Advisors

Data Theft Warning Signs From IRS

Foodman CPAs & Advisors on

IRS Awareness Campaign for the Summer 2023 focuses on data theft signs and the importance of staying alert against new and ongoing threats of tax-related identity in order to protect the taxpayer and the tax professional. ...more

Baker Donelson

MOVEit Transfer Zero-Day Vulnerability: What Companies Need to Know

Baker Donelson on

On May 31, 2023, renowned managed file transfer solution provider Ipswitch, Inc. revealed a zero-day vulnerability in its flagship solution, MOVEit Transfer, that can enable mass data theft from thousands of organizations....more

BakerHostetler

I Won’t Get Fooled Again: Measures Universities Should Take to Combat North Korea’s Use of Spearphishing Campaigns to Access Their...

BakerHostetler on

On June 1, the FBI, the U.S. Department of State and the National Security Agency, together with the Republic of Korea’s (ROK) National Intelligence Service, National Police Agency and Ministry of Foreign Affairs, issued a...more

Association of Certified E-Discovery...

[Webinar] How to Ensure Departing Employees Don't Turn Into Insider Threats - May 18th, 1:00 pm - 2:00 pm EDT

Offboarding employees after they've resigned or been terminated is largely a routine process; they turn in their devices, which can then be imaged and archived. But are you routinely investigating their computer activity...more

Association of Certified E-Discovery...

Digital Forensics: A Look into Employee Data Theft Investigations

Employee data theft happens frequently, and especially in current times where employees are leaving or being terminated. Some may be due to layoffs while others may leave for personal or other reasons. However, there is...more

Kelley Drye & Warren LLP

[Webinar] 2022 WORKing Lunch Series: Protecting Your (Human) Resources: Fighting Business Email Compromise and Ransomware -...

HR employees are, willingly or not, the guardians of the company’s most sensitive collection of data—its employee’s personal information. Cybercriminals often perceive the human resources department as the perfect gateway...more

Ankura

The Metaverse – What Does It Mean for Data Privacy and Information Security?

Ankura on

What are the implications for data privacy and information security in the Metaverse? The metaverse will create an “even more immersive and embodied Internet”, where users can meet friends, collaborate with colleagues, play...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - January 2022 #3

Robinson & Cole LLP on

CYBERSECURITY - ECRI Names Cybersecurity Attacks as Top Health Technology Hazard for 2022 - ECRI has been publishing its annual report of health technology hazards for the past 15 years. According to ECRI’s Device...more

Hinshaw & Culbertson - Law Firm Cyber Alerts

Practical Tips to Mitigate the Risk of Being Hacked by Fake IRS or Google Voice Scams

Risk Management Question - What are some of the newest hacking scams that may affect law firms and other businesses? The Issue - On October 27, 2021, the Federal Trade Commission (FTC) issued warnings to be on alert...more

Epiq

[Webinar] What is insider risk, and why do companies ignore it? - November 16th, 12:00 pm AEDT

Epiq on

What is insider risk? Managing and minimising risk in your organisation starts with understanding the types of risks in the modern workplace. Some risks are driven by external events and factors that are outside of direct...more

Epiq

[Webinar] What is insider risk, and why do companies ignore it? - October 7th, 11:30 am - 12:10 pm GMT

Epiq on

What is insider risk? Managing and minimising risk in your organisation starts with understanding the types of risks in the modern workplace. Some risks are driven by external events and factors that are outside of direct...more

Reveal

Hackers Will Not Only Take Your Money, They Could Also Take Your Patients’ Lives

Reveal on

Go to just about any news site today and there is probably a new story about a data breach that costs a company millions of dollars. Just in the past few weeks, we’ve seen Colonial Pipeline pay as much as $5 million in...more

Fisher Phillips

New Federal Tools Can Help Private Sector Protect Trade Secrets From Cyberattacks – And May Soon Require Reporting

Fisher Phillips on

Cybersecurity was undoubtably on the forefront of the agenda for many organizations in 2020 – and 2021 should be no different. The rapid shift to remote work over the past year has led to an increased number of cybersecurity...more

Farella Braun + Martel LLP

Data Center Business Deals Gone Bad, and the Risks of the “Known in the Industry” Defense

Exploring business partnerships often involves or even requires sharing highly confidential trade secret information. The data center industry is no exception, and its participants have in recent years faced litigation...more

International Lawyers Network

Protecting Confidential Information in Canada: Is there a Better Way?

The British Columbia decision Equustek Solutions Inc. v Jack highlights the difficult, time consuming, and expensive exercise that organizations may find themselves in when an employee misuses confidential information. In...more

Health Care Compliance Association (HCCA)

Security Threats Soar From Nation-State Bad Actors as the New Year Gets Underway

Report on Patient Privacy 18, no. 1 (January 2021) - Security threats to health care entities will continue to escalate in 2021, as bad actors with significant capabilities target pandemic-weary organizations still...more

ArentFox Schiff

Class Actions Quarterly Update: Labor and Employment

ArentFox Schiff on

Garner v. Inter-State Oil Co., 52 Cal.App.5th 619, Cal. App. 3 Dist., June 26, 2020, as modified (Jul 23, 2020) - Plaintiff filed a class action alleging that his employer, Inter-State Oil Co., violated a variety of wage...more

Fisher Phillips

Cybercriminals Target Healthcare Industry During The Pandemic

Fisher Phillips on

Several federal agencies have teamed up to warn healthcare employers of the increased threat they face as a result of malicious cybercriminals aiming to take advantage of the pandemic to wreak havoc on their operations. The...more

108 Results
 / 
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide