Ask any chief information security officer (CISO), cyber underwriter or risk manager, or cybersecurity attorney about what controls are critical for protecting an organization’s information systems, you’ll likely find...more
The FCC has significantly expanded telecommunications carriers’ data breach notification and reporting obligations. Telecommunications carriers, including Voice over Internet Protocol (VoIP) services, and telecommunications...more
At its December meeting, the Federal Communications Commission approved a Report and Order modifying its data protection rules. The order expands the scope of protected data to include personally identifiable information....more
The Federal Communications Commission (“FCC”) announced Thursday that in furtherance of the work of the agency’s Privacy and Data Protection Task Force, the FCC’s Enforcement Bureau signed Memoranda of Understanding (“MOU”)...more
On July 26, 2023, the U.S. Securities Exchange Commission (“SEC”) adopted final rules regarding cybersecurity risk management, strategy, governance, and incident reporting by public companies. The final rules require...more
The Federal Communications Commission has released a Notice of Proposed Rulemaking (NPRM) seeking to modernize the data breach reporting requirements for customer proprietary network information (CPNI), which apply to all...more
EDRM Ripped From the Headlines Webinar Series: In this fireside roundtable, guests, Jason R. Baron, former NARA and current Professor of the Practice at the University of Maryland and James and Jack Dever, cyber attorneys...more
In Washington: Two public health experts on President-elect Biden’s COVID-19 task force rejected the idea of broad “lockdowns” like those seen in the spring designed to slow skyrocketing case numbers. Celine Gounder told...more
In Washington: The Treasury Department, working with the Internal Revenue Service (IRS), mistakenly delivered more than a million stimulus payments worth about $1.4 billion to deceased people, according to a report...more
Below is a summary of some of the significant legal and regulatory actions that occurred over the past week. This alert is not intended to be a comprehensive list of all such developments, but rather a selection of...more
The best way for a company to handle a data breach is to be prepared. As we discuss in our data breach readiness handbook, preparation includes, among other things, drafting an incident response plan, reviewing...more
American Thrift Stores announced this week that like other retailers, it has been hit with a security breach “that occurred through software used by a third-party service provider” that allowed “criminals from Easter Europe”...more
Sergey Vovnenko, a Ukrainian hacker, was charged in New Jersey federal court this week for wire fraud conspiracy, unauthorized computer access and aggravated identity theft for allegedly hacking into networks of financial...more
The U.S. Secret Service’s most recent scandal spectacularly illustrates the need to enforce restrictions on access to databases housing confidential information. According to a September 25, 2015, report from the Office of...more
No doubt much to the delight of Fiat Chrysler Automobiles’ Sergio Marchionne, the Vatican recently announced that Pope Francis would use a modified Jeep Wrangler to serve as the popemobile for his upcoming U.S. visit...more
The 2015 US State of Cybercrime survey has been released and is worth a read. The Survey, co-sponsored by PwC, CSO, the CERT Division of the Software Engineering Institute at Carnegie Mellon University and the United States...more
Domestic Developments - Florida. Anthony Murgio and Yuri Lebedev, operators of bitcoin exchange service Coin.mx were arrested on July 21, 2015 for operating the exchange without a money transmission license. The U.S....more
The massive holiday hacking of consumer information belonging to Target and Neiman Marcus customers has the impacted retailers under a microscope. State Attorneys General across the country have banded together to launch a...more