News & Analysis as of

Personally Identifiable Information Data Protection Risk Management

Katten Muchin Rosenman LLP

SEC Grants Further Relief From Including Personally Identifiable Information in CAT Reporting

On February 10, the Securities and Exchange Commission (SEC) granted relief exempting industry members from reporting a natural person’s name, address, and year of birth to the Consolidated Audit Trail (CAT). Industry members...more

Tarter Krinsky & Drogin LLP

Businesses Have 30 Days to Report a Security Breach of New Yorker’s Private Information

New York State Governor Hochul recently gave us a “pre” New Year’s gift: effective on December 21, 2024, any individuals or businesses possessing the “private information” of New Yorkers must notify them, and certain state...more

Levenfeld Pearlstein, LLC

New Year, New State Data Privacy Laws

With the advent of a new year comes a new set of consumer data privacy laws in the United States. Five new state data privacy laws go into effect in January 2025, with additional laws coming throughout 2025 and into 2026....more

Jackson Lewis P.C.

FAQs for Schools and Persons Affected By the PowerSchool Data Breach

Jackson Lewis P.C. on

A massive data breach hit one of the country’s largest education software providers. According to EducationWeek, PowerSchool provides school software products to more than 16,000 customers, largely K-12 schools, that serve 50...more

Constangy, Brooks, Smith & Prophete, LLP

Who needs a WISP, and why?

A Written Information Security Plan, or “WISP,” is essential for any organization that handles sensitive personal information. Here’s a quick breakdown of who needs a WISP and why, as well as a checklist to develop one:...more

Robinson+Cole Data Privacy + Security Insider

Microsoft Report Highlights Attacks Against Healthcare Organizations

On October 22, 2024, Microsoft issued a threat trend research report entitled “US Healthcare at risk: Strengthening resilience against ransomware attacks.” In it, Microsoft declares that ransomware attacks against the...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #418 – New Phishing Scheme Uses Scarce Weight Loss Drugs as Hook

Scammers are always looking for new ways to dupe victims. If you battle your weight, you think about it a lot and are always looking for easier ways to lose some pounds. There is no easy way, but we are always looking for an...more

Troutman Pepper Locke

Federal Cybersecurity Requirements Ought Not Be Ignored by Contractors

Troutman Pepper Locke on

Since 2016, the federal government has implemented numerous procurement regulations and associated contract clauses to address cybersecurity by requiring contractors to adopt various controls and standards to protect...more

Baker Botts L.L.P.

23andMe’s $30M Settlement: What It Means for Companies Handling Genetic and Genomic Data

Baker Botts L.L.P. on

The recent $30 million settlement between 23andMe and 6.4 million users following a major data breach offers important lessons for businesses dealing with sensitive genetic and genomic information....more

Cozen O'Connor

Missouri AG Investigates Hack of National Public Data

Cozen O'Connor on

Missouri AG Andrew Bailey has opened an investigation into Jerico Pictures, Inc. d/b/a National Public Data, a background check data aggregator, over a data breach that has allegedly exposed personally identifiable...more

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part II - E-Discovery Unlocked: Managing the E-Discovery Data Minefield - September 12th, 1:00 pm...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information. This...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #411 – Phishing Attacks Increased 40% in 2023

Everyone thinks they can spot a phishing email. If true, we would not see so many security incidents, data breaches, and ransomware attacks. The statistics are overwhelming that phishing emails are a significant cause of data...more

Association of Certified E-Discovery...

[Webinar] Uncovering E-Discovery Data Risks - How to Identify and Mitigate Hidden Threats Before It's Too Late - August 28th,...

Something keeping you up at night? It just might be the data risks hiding in your e-discovery process. Join us for an in-depth webinar on "Uncovering E-Discovery Data Risks: How to Identify and Mitigate Hidden Threats Before...more

Miller Nash LLP

[Webinar] Privacy 101: Navigating the Digital Frontier - June 4th, 9:00 am - 10:00 am PT

Miller Nash LLP on

Join us for an insightful webinar with Miller Nash’s head of privacy and data security team, Eva Novick, and colleague, Delfina Homen, where we will delve into the essentials of privacy and data security in 2024. Whether...more

Robinson+Cole Data Privacy + Security Insider

Ransomware Hitting U.S. Companies at Increasing Rate

Unfortunately, according to Unit 42 of Palo Alto’s recently published “Ransomware and Extortion Report,” ransomware groups had a good year in 2022. They found that threat actors are using multi-extortion tactics to get paid...more

Pillsbury - Propel

Privacy Breach: The Silent Killer of Startups

Pillsbury - Propel on

A privacy breach can have detrimental consequences for startups:  A privacy breach may trigger legal consequences and regulatory scrutiny, especially for a startup that operates in areas with stringent data protection laws...more

Robinson+Cole Data Privacy + Security Insider

Resilience Midyear 2023 Claims Report: Ransomware Cybercriminals Shift Tactics

Resilience issued its Midyear 2023 Claims Report, which is well worth the read. In addition to commenting on the impact of the MOVEit incident, some of the key findings include...more

Robinson+Cole Data Privacy + Security Insider

Red Cross Creates Rules for Civilian Hackers in Conflict Zones

The International Committee of the Red Cross (ICRC) has taken a new step to regulate the activities of civilian hackers in conflict zones. To address the rise in the involvement of civilian hackers in inter-state conflicts,...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #372 – Personal Preparedness for Massive Cyber-Attack

It is scary to think of cyber warfare and how it may affect us. But the reality is there, and we should be prepared. I was chatting with a colleague this morning who asked for the top two things to do to prepare for a massive...more

Thomas Fox - Compliance Evangelist

The Importance of Effective Policies and Training in Data Protection: Lessons from a Scottish Hospital Breach

I recently had the chance to visit with Jonathan Armstrong on a recent data breach case that occurred in the health service provider NHS Lanarkshire (Scotland) during the COVID-19 pandemic. This breach serves as a stark...more

Health Care Compliance Association (HCCA)

Are Your Workers Data Protectors or Stewards? For Best Results, Organizations Should Foster Both

In some respects, assuring compliance with HIPAA has always been a challenge because many health care providers, particularly physicians, pride themselves on maintaining patient confidentiality—even when they aren’t. Nurses,...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #329 – Download Apps for Single Use—Then Delete

I traveled this week by plane to a client to conduct a cybersecurity tabletop exercise—one of my favorite things to do (the tabletop, not the flying). - To be able to use the wi-fi, everyone instructed in the gate area was...more

Health Care Compliance Association (HCCA)

Hybrid Workforces and Compliance with Sheila Limmroth

Hybrid work is likely here to say, and, as Sheila Limmroth, privacy specialist at DCH Health System, and the author of the chapter Hybrid Work Environment in the Complete Healthcare Compliance Manual observes in this...more

Fenwick & West LLP

To Pay or Not to Pay: Five Critical Approaches to Beating a Ransomware Threat

Fenwick & West LLP on

It’s the call you hope you never get. Your company has been hit with a ransomware attack. Your systems are offline. Your customer data was stolen by an unknown threat actor who is threatening to leak it. You have lots of...more

Robinson+Cole Data Privacy + Security Insider

China-Based Ransomware Operator Exploiting Log4j Vulnerability

Microsoft has issued frequent updates on the Log4j vulnerability that we have been hearing so much about. The vulnerability is a serious problem that will become more widespread as time goes on....more

267 Results
 / 
View per page
Page: of 11

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide