News & Analysis as of


Data Privacy + Cybersecurity Insider - March 2018 #4

by Robinson & Cole LLP on

Russians Continue to Attack U.S. Energy and Power Sectors - Late last week, a joint statement by the Department of Homeland Security and the Federal Bureau of Investigation confirmed that the Russian government has been...more

South Dakota Enacts Data Breach Notification Law

by Ballard Spahr LLP on

South Dakota has become the 49th State to enact a data breach notification law. South Dakota Governor Dennis Daugaard signed SB 62 into law on March 21, 2018. The law will take effect on July 1, 2018....more

What Arizona Companies Need to Know About Arizona Cybersecurity Law

by Ballard Spahr LLP on

Given the nearly daily reports of data breaches, ransomware attacks and phishing exploits affecting entities of all sizes, Arizona entities should be aware that Arizona law may require them to provide notice to employees,...more

Hacking Your Vote From Inside Your Head: How Cambridge Analytica Altered Reality Via Social Media To Induce Specific Voting...

We learned some important lessons this week about the dangers inherent to losing control of your customer or client data, either through hacking, internal theft, or poorly designed controls over what your business associates...more

Orbitz Confirms Breach of Travel Records and Credit Card Information of 880,000 Individuals

Orbitz, the travel booking entity that is owned by Expedia, has confirmed that it has “identified and remediated a data security incident affecting a legacy travel booking platform.” This means that one of its older websites...more

Would You Like Malware with Your Grumpy Cat Meme?

Social media companies like Facebook and Twitter have written “white papers” and devoted considerable resources to projects intended to create services that encourage trust and a sense of familiarity on the part of users....more

The Report to the President for “Enhancing the Resilience of the Internet and Communications Ecosystem Against Botnets and Other...

Back in January, a draft report from the U.S. Department of Commerce and the U.S. Department of Homeland Security was released to President Trump in order to address his May 11, 2017 Executive Order, which called for...more

“White Hat” Ethical Hackers and Corporate Investigations

by McGuireWoods LLP on

A “white hat” is an ethical computer hacker who specializes in penetration testing and other testing methodologies to ensure the security of an organization’s information systems. According to the Ethical Hacking Council,...more

North Carolina Security Breach Report 2017

by Moore & Van Allen PLLC on

According to the recently released North Carolina Attorney General Security Breach Report, nearly 5,337,154 North Carolinians were impacted by security breaches in 2017. ...more

Take the Test: Will You Fall Prey to Phishing? 6 Tips to Identifying an Email Scam

by McManis Faulkner on

Email is the driving force of communication. Lawyers often receive over 100 emails a day. It can be easy to overlook potential scams hidden in your inbox. Hopefully, your firm has the proper security protocols in place:...more

Ninth Circuit Gives Leg Up To Shoe Purchasers’ Data Breach Suit

by Carlton Fields on

On March 8, a Ninth Circuit panel held that fear of identity theft in the wake of a data breach satisfies the standing requirements of Article III of the United States Constitution....more

Ausstrahlung von Anschlag in heutiger Welt

by Hogan Lovells on

Unter ihnen sind, besonders, Vielseitigkeit, einfache Umsetzung, niemals Notwendigkeit jetzt für zusätzliche Hardware, sondern auch nahezu unbegrenzte Möglichkeiten dieser Veränderung des weiteren Entwicklung. Erhöhte...more

Cyber Risk News & Trends

Cybersecurity This Month - Are U.S Elections At Risk? "Frankly, the United States is under attack," U.S. Director of National Intelligence Dan Coats said at the Senate Intelligence Committee’s annual hearing on...more

473,807 Patient Records Compromised in January, 2018—83 Percent Caused by Hacking Incidents

The recently released Protenus Healthcare Breach Barometer report notes that in January, 2018, at least 473,807 patient records were compromised in 37 breaches reported to the Office for Civil Rights. ...more

Data Privacy + Cybersecurity Insider - March 2018 #3

by Robinson & Cole LLP on

Verizon's Protected Health Information Data Breach Report Concludes that Insiders Are Greatest Threat to Health Care Entities - Verizon recently issued its Protected Health Information Data Breach Report, which is always...more

It’s that time of year again: Phish Madness!

Beware of March Madness! Scammers and phishers take advantage of increased web traffic by impersonating popular March Madness websites, including bracket sites and game live streams. Will your employees take the bait?...more

Privacy Tip #130 – Smartphones Targeted by Dark Caracal Attack

There is a global malware campaign that is targeting mobile devices across the world. It is called Dark Caracal, which is believed to be sourced in Beirut by the Lebanese General Security Directorate. ...more

Tribute to Hawking: Black Holes Everywhere

by Thomas Fox on

Holmes was one of the most famous women to come out of Silicon Valley. She founded Theranos, hyped the fraudulent blood testing scam and became for a short time a billionaire. Now all of that is gone, gone, gone. ...more

SEC Commissioners Provide Guidance on Cybersecurity Disclosures After Wave of Record Incidents

The Commission's "new" cybersecurity guidance largely rehashes existing guidance, as is highlighted by objections from two commissioners. At most, the additional qualitative guidance is incremental. It reiterates the need to...more

A Primer on the SHIELD Act: New York’s Move to Adopt More Stringent Data Security Requirements, Part II

What would companies need to do to comply with the law? The Stop Hacks and Improve Electronic Data Security (SHIELD) Act imposes requirements in two areas: cybersecurity and data breach notification. The cybersecurity...more

The High Cost of Data Breaches: Six Examples From 2017

by Revision Legal on

Whether you are a small startup or a big company with a long and storied history, a data breach can be a legal and financial nightmare. There were over 850 cyberattacks and data breaches in 2017 alone, with the number and...more

Gavel to Gavel: Data security starts before hiring

by GableGotwals on

Almost daily, we learn that yet another corporation has suffered a major data security breach, potentially exposing the private information of millions of people. However, it’s not always faceless, faraway hackers who are...more

Data Breach Class Action Dismissal Shows Two Grounds for Dismissing Data Breach Cases

by Faegre Baker Daniels on

On March 7, 2018, the United States District Court for the District of Minnesota dismissed a putative data breach class action against SuperValu, Inc., because the plaintiffs did not have standing and could not state claims...more

Lauri Love – How high has the forum bar really been set?

by White & Case LLP on

In what has been hailed as a landmark decision, the High Court recently refused to allow the extradition of UK citizen Lauri Love to the USA for offences of cyber theft, activating the forum bar for the first time since its...more

Best practices for managing cybersecurity risks related to IoT-connected medical devices

by Hogan Lovells on

Connected medical devices deliver numerous benefits not available before, including improved monitoring of patient welfare and a wealth of vital data. But for all the advantages available through these devices, their...more

1,613 Results
View per page
Page: of 65

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.