News & Analysis as of

Security and Privacy Controls

Preparing for a payment card data breach: what should businesses do?

by DLA Piper on

An estimated 164 million payment cards were in use in the UK in 2016. With almost £4 billion spent using contactless cards alone in April 2017 and new breach notice requirements coming into force soon, those involved...more

10 Steps to GDPR Compliance - Privacy Matters

by Katten Muchin Rosenman LLP on

Privacy Matters examines the General Data Protection Regulations (GDPR) and practical tips on achieving compliance in advance of its implementation on May 25, 2018. This issue provides 10 steps that businesses and legal...more

How Employers Can Become Experts at Data Breaches: HR service providers

by Bryan Cave on

A large portion of the data breaches that occur each year involve human resource related issues. This includes situations in which HR data was lost, employees were inadvertently responsible for the loss of information about...more

How Employers Can Become Experts at Data Breaches: What is a WISP?

by Bryan Cave on

A large portion of the data breaches that occur each year involve human resource related issues. This includes situations in which HR data was lost, employees were inadvertently responsible for the loss of information about...more

Chipping Employees: The “Wave” of the Future?

by Seyfarth Shaw LLP on

A key cinematic meme over the past 25 years is an electronic device implanted under your skin that tracks your movements, provides you access to restricted areas, or connects you to a larger virtual community. ...more

Five Lessons from Equifax

by Taylor English Duma LLP on

The continuing fall-out from the Equifax breach reported last month makes great headline fodder, and is really good for Congressional representatives eager to show themselves hard at work protecting voters....more

[Webinar] - Your Money or Your PHI: HHS "Guidance" on Ransomware - October 10th, 1:00pm CT

In recent years, HIPAA enforcement actions and penalties have increased both in volume and amount. Ransomware is the fastest growing malware threat to businesses that use electronic data. This webinar will provide listeners...more

The 2017 Human Resource Professional's Handbook for Data Security Breaches

by Bryan Cave on

About twelve years ago, when most people had never heard the term “data breach”, a colleague asked me what type of law I practiced. I tried to explain that I helped companies collect, secure, and share data, and, when data...more

Retirement Plans at Risk for Identity Theft

by Winstead PC on

While many cyber threats have special names, e.g., ransomware, malware, cryptolocker, advanced persistent threats or GRIZZLY STEPPE (a malicious cyber attack that occurred late in 2016), your retirement plan’s data may be...more

[Event] 2017 Cybersecurity Symposium - October 23rd, Los Angeles, CA

by Nossaman LLP on

Nossaman LLP and University of California, Irvine School of Law invite you to join us for "Cybersecurity, Data Breach, and Privacy: A Real World Perspective on Prevention, Response and the Future." This complimentary...more

Client Alert: FTC Gives Guidance in Slaying the Data Breach Dragon

The FTC has recently provided specific guidance on what it considers appropriate data breach protection activity by financial institutions. Such guidance came by virtue of a proposed consent order, dated August 29, 2017,...more

Beyond Care, Custody, and Control: Data Security Best Practices for the Transportation and Logistics Sector

by Benesch on

The receipt, storage, and handling of sensitive shipper data occurs, often frequently and in real-time, alongside the flow of goods. Commercial shippers are well aware of the supply chain security risk to the materials and...more

Reflections on Equifax Hack

by Taylor English Duma LLP on

The Equifax hack announced September 7 is very scary, and a reminder to lock up the company jewels. Most companies, however, will never face a catastrophic event involving an outside, malicious attack on the very core of...more

Key New Takeaways from Uber’s Privacy and Data Security Settlement with the FTC

On August 15, 2017, the Federal Trade Commission (FTC) announced that it had reached an agreement with Uber Technologies to settle allegations that the ride-sharing company had deceived consumers by failing to live up to its...more

Connecting the Dots: Key Developments and Best Practices for Evaluating Privacy and Security Risks in IoT Investments

by Shearman & Sterling LLP on

The market for internet-connected devices (often referred to as the Internet of Things, or IoT) is growing rapidly. Investment in this burgeoning space can be attractive, and according to research firm IDC, the worldwide...more

Bring Your Own Device (“BYOD”) Policies

by Bryan Cave on

Many companies permit their employees to use personal mobile devices, such as smartphones and tablets, to access company-specific information, such as email, under a Bring Your Own Device (“BYOD”) policy. BYOD policies can be...more

Can I “Chip” Away at my Employees’ Privacy?

by Gray Reed & McGraw on

“Big” Bob Brothers is concerned that his company, Big Brothers Security Systems, is losing out on customers because his salesmen and installation teams are slacking when they are out of the office. Brothers reads a newspaper...more

Federal Trade Commission Presses Forward with Data Security Enforcement in Settlement with Uber

by Ropes & Gray LLP on

On August 15, Uber Technologies, Inc. (“Uber”) reached an agreement with the Federal Trade Commission (“FTC”) to settle allegations that the company deceived consumers by misrepresenting its security and employee access...more

The impact of the GDPR on businesses in South Africa

by DLA Piper on

Businesses operating in South Africa are currently facing the imminence of the Protection of Personal Information Act 4 of 2013 (POPI). POPI will come into effect in its entirety, by presidential proclamation, on a date which...more

Another Key to HIPAA Compliance – Have Policies and Procedures and Implement Them, Too

by Williams Mullen on

On this blog, we have discussed the criticality of risk analyses – the assessment required by the Security Rule of the “risks and vulnerabilities” that an organization faces with respect to all of its electronic protected...more

SEC’s Latest Cybersecurity Risk Alert Identifies Elements of Robust Policies and Procedures

by Dorsey & Whitney LLP on

On August 7, 2017 the Securities and Exchange Committee (“SEC”) Office of Compliance Inspections and Examinations (“OCIE”) released yet another cybersecurity Risk Alert entitled, “Observations from Cybersecurity...more

Employers Monitoring Employees Through Biochip Hand Implants

On August 1, 2017, 32M, located in Wisconsin, is offering its employees the ability to have RFID chips implanted into their hands to make purchases at the company break rooms, open doors, use the copy machine and log on to...more

How Can Healthcare Organizations Prepare for the Next Cyberattack?

by Latham & Watkins LLP on

HHS OCR issues checklist, iterative guidance in wake of WannaCry and Petya attacks; Anthem breach settlement provides additional lessons. Key Points: ..Healthcare organizations are particularly vulnerable to ransomware...more

Petya Global Ransomware Attack Shows Why Businesses Should Prepare for Loss or Unwanted Encryption of Key Data

by Lathrop Gage on

What is it? This new variation of Petya (“Little Peter” in Russian) is more robust ransomware than last month’s North Korean WannaCry ransomware. It has no kill switch, and it encrypts entire hard drives, not just individual...more

PRC Cybersecurity Law: take action and monitor developments to avoid losing your China business

by DLA Piper on

The PRC Cybersecurity Law is three weeks old, and non-compliant international businesses are already facing severe consequences. Since 1 June, twenty-two people engaged by a global technology giant have been arrested, and...more

199 Results
|
View per page
Page: of 8
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.