News & Analysis as of

Risk Management Computer Fraud and Abuse Act (CFAA)

Miles & Stockbridge P.C.

Avoid Turning One Data Breach into Two

When can a data breach get worse? When the process of notifying victims creates a second breach. Take the example of a cancer treatment center that recently paid $425,000 to settle allegations that included a faulty...more

Obermayer Rebmann Maxwell & Hippel LLP

What Employers Need to Know to Safeguard Their Trade Secrets

The protection of trade secrets and other confidential information is important to the bottom line of every company, whether a Fortune 100 corporation or a small business. In furtherance of that objective, this post gives...more

Hogan Lovells

Bipartisan Group of Senators Introduce Bill to Impose Baseline Security Requirements for IoT Devices Provided to U.S. Government

Hogan Lovells on

On August 1, a bipartisan group of four senators introduced a bill that would impose specific cybersecurity requirements on providers of Internet of Things (IoT) devices when doing business with the U.S. Government and...more

WilmerHale

A Closer Look at Cybersecurity Legislation and Regulations in the US and Abroad - United States

WilmerHale on

Legal Framework - Summarise the main statutes and regulations that promote cybersecurity. Does your jurisdiction have dedicated cybersecurity laws? The United States generally addresses cybersecurity...more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide