News & Analysis as of

Information Technology

How to Generate, File, Retain and Execute Electronic HR Documents While Complying with Employee Records Laws and Electronic...

by Littler on

Every minute of every workday, multinational employers rely on sophisticated HR information technologies to manage their global workforces. Laws worldwide regulate information technology, and so multinationals must comply,...more

Upcoming meeting signals the growing role of federal regulators over IoT and product safety

by Hogan Lovells on

The U.S. Consumer Product Safety Commission (CPSC) will host a hearing on May 16, 2018 on potential safety hazards associated with internet-connected consumer products....more

What Employers Need to Know About the Dark Web

by Fisher Phillips on

The average internet user may be largely unaware that there are actually different “levels” of the internet. First, there is the surface level of the internet where companies post their webpages, and where employees may...more

New Jersey AG Fines Virtua Medical Group $418,000 for Data Breach Caused by Vendor

The New Jersey Attorney General announced this week that it has fined Virtua Medical Group, which is comprised of more than 50 medical practices in New Jersey for failing to protect the privacy of 1,650 patients when their...more

CPSC Explores Safety Hazards in 'Internet of Things' Products

by Ballard Spahr LLP on

The U.S. Consumer Product Safety Commission (CPSC) recently announced that it will hold a hearing on May 16 to receive information on potential hazards concerning Internet of Things (IoT) products. The CPSC also is accepting...more

Back-to-Basics Approach on Injunctive Relief

On April 3, 2018, Susan Bodine, Assistant Administrator of U.S. EPA’s Office of Enforcement Assurance and Compliance Assistance (OECA), issued an internal memorandum titled “The Appropriate Use of Compliance Tools in Civil...more

M&A and Cyber Diligence: New York’s DFS Issues a Reminder

Over the last year, U.S. companies have been hit with a wave of new data security regulations and agency guidance, ranging from the SEC’s Guidance on Public Company Cybersecurity Disclosures to the European Union’s General...more

Feds Seek Gig Economy Aid To Help Provide Services To Veterans

by Fisher Phillips on

The growth and benefits of the gig economy are well documented. By some accounts, more than 31 million individuals in the U.S. workforce derive their primary income from the gig economy, and businesses continue to provide...more

Data Security Litigation: CPSC to Hold Hearing on The Internet of Things and Consumer Product Hazards

by Ballard Spahr LLP on

The U.S. Consumer Product Safety Commission (CPSC) recently announced that it will hold a hearing on May 16, 2018, to receive information on potential hazards with Internet of Things (IoT) products....more

Springtime for HIPAA

by Ballard Spahr LLP on

The virtual world offers opportunities and obligations not found in nature. For a couple of years, my wife has followed the adventures of a bonded eagle couple, Liberty and Freedom, residing in the hills near Hanover,...more

Blockchain for Healthcare

Blockchain technology is finding its way into every industry. Healthcare is no exception. According to a recent report by Deloitte, “blockchain technology has the potential to transform health care, placing the patient at the...more

Saudi Arabia: new Cloud Computing Regulatory Framework

by Dentons on

In early 2018 (following a public consultation process held during 2016), the Saudi Communications and Information Technology Commission (CITC) issued the Cloud Computing Regulatory Framework (CCRF). The CCRF entered into...more

6 Tips to Bridge the Gap between IT and Legal: An Interview with an E-Discovery Professional

by Exterro, Inc. on

Successful e-discovery projects depend on collaboration between two departments: Legal and IT. Sometimes the two departments collaborate seamlessly, but often there are difficulties. These trouble spots may arise from...more

Expect the “Fake” to Get Very Real

Persuaders win by convincing decision-makers that their story is more “real” than the alternative. But what if the foundation for that choice, the notion that there is a “real” to aspire to, is eroding? If it is, then...more

What’s the Return on Investment for Automated Legal Hold Software?

by Zapproved LLC on

Learn the rewards of streamlining your legal hold process - If you’re still managing legal holds with an archaic conglomeration of spreadsheets, emails, and duct tape, you can do better. Today’s automated, cloud-based...more

[Webinar] Dealing with Vendors and Data Security - April 12th, 12:00pm CT

by Thompson Coburn LLP on

Businesses of all sizes have a multitude of vendor relationships. These vendors provide a range of services from the use of special or expensive equipment to outsourcing IT or business process functions as well as hosting...more

Cybersecurity Oversight

by Ropes & Gray LLP on

Financial regulators continue to expand their reach in the cybersecurity space, and funds, fund sponsors, and advisers should take note. Most recently, on February 12, the CFTC filed a simultaneous Order and Settlement...more

If You Don’t Need It, Don’t Pack It: Border Searches of Mobile Devices

by Dickinson Wright on

Currently there are a number of pending cases concerning the issue of whether Border searches can include a search of someone’s cellphone. On March 15, 2018, a divided 11th Circuit Court, upheld the conviction of a Florida...more

473,807 Patient Records Compromised in January, 2018—83 Percent Caused by Hacking Incidents

The recently released Protenus Healthcare Breach Barometer report notes that in January, 2018, at least 473,807 patient records were compromised in 37 breaches reported to the Office for Civil Rights. ...more

Verizon Protected Health Information Data Breach Report Concludes that Insiders Are Greatest Threat to Health Care Entities

Verizon recently issued its Protected Health Information (PHI) Data Breach Report, which is always an interesting read. Not surprisingly, Verizon’s report concludes that based upon analysis of 1,360 security incidents...more

DFS Issues Compliance Certificate “Reminder”

Last week, the New York Department of Financial Services (DFS) sent notices to companies that had not yet certified their compliance with the DFS Cybersecurity Regulation....more

Data Privacy + Cybersecurity Insider - March 2018 #2

by Robinson & Cole LLP on

Cybersecurity Task Force Launched in Arizona - Arizona Governor Doug Ducey launched the Arizona Cybersecurity Team (ACT) by Executive Order on March 1, 2018. The ACT is comprised of 22 members representing officials from...more

New York Department of Financial Services Updates Cybersecurity Guidance: Coverage of Cybersecurity Requirements Addressed in 4...

On March 1, 2018, the New York Department of Financial Services (NYDFS) “cybersecurity regulations” (23 NYCRR Part 500) took effect, placing a number of cybersecurity requirements on banks, insurance companies, and other...more

Disrupting the law

by Hogan Lovells on

As developing countries continue to gain access to technology and begin to innovate existing systems, it is has become clear that technology has stopped being an end in itself but an instrumental tool and means to accelerate...more

Washington Suburb Targeted by Cybercrime and Ransomware Attacks – Cyber News

by White and Williams LLP on

A recent report from The Seattle Times provides details on a series of social engineering and ransomware attacks successfully perpetrated on a Seattle suburb during the second half of 2017. The incidents of cyber scams...more

404 Results
|
View per page
Page: of 17
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.