News & Analysis as of

Security and Privacy Controls Best Practices

Bricker Graydon LLP

Scammers, SSNs, and Smelling Funny

Bricker Graydon LLP on

I was hanging out with my friend this weekend, both catching up on emails from a coffee shop. After a while, he turned to me. “Well sh*t. Looks like my social security number might be on the dark web.”...more

Epiq

The Most Effective Ways to Prepare your Organization for a Cyber Incident

Epiq on

Cyber incidents have surged in recent years, with attacks more than doubling since 2020 and the number of victims totaling in the hundreds of millions in 2023 alone. These incidents can cost organizations millions or even...more

Esquire Deposition Solutions, LLC

Actionable Advice When Sharing Client Data with Vendors

We’ve previously written on the need for law firms to scrutinize the data security protections in place at all third-party vendors who have access to client confidential information. Clearly, that’s still good advice....more

Holland & Knight LLP

Plaintiffs Request Court Approval of $8.7M Settlement in ERISA Class Action Cyberattack Lawsuit

Holland & Knight LLP on

Multi-employer plan participants involved in an Employee Retirement Income Security Act of 1974 (ERISA) class action lawsuit against Horizon Actuarial Services LLC (Horizon), a national retirement services firm, have entered...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

Cybersecurity and Privacy: 10 Best Practices When Working From Home

As the news reports show, the sudden shift to employees working from home poses new cybersecurity risks for businesses and the employees who work remotely. Below are 10 important measures that can help mitigate these...more

BCLP

Organizing Data Privacy Within A Company (2018 Update)

BCLP on

Although organizations have dealt with privacy issues for years, only in the past decade have they begun to view the complexities of privacy as requiring formal organizational structure, dedicated employees, and/or dedicated...more

BCLP

Bring Your Own Device (“BYOD”) Policies

BCLP on

Many companies permit their employees to use personal mobile devices, such as smartphones and tablets, to access company-specific information, such as email, under a Bring Your Own Device (“BYOD”) policy. BYOD policies can be...more

Bennett Jones LLP

Cybersecurity Threats Everywhere–Beware of USB Keys

Bennett Jones LLP on

In as little as 13 seconds, all of a company's data can be stolen by simply plugging in a USB drive. Intelligence agencies famously used this approach when uploading the Stuxnet worm at an Iranian nuclear facility, but...more

Blake, Cassels & Graydon LLP

Top 10 Issues for Employers, Issue #6: Balancing BYOD Programs with Expectations of Privacy at Work

This is the sixth instalment in our Top 10 Issues for Employers series. OVERVIEW - The workplace practice of bring your own device (BYOD) has hit the mainstream as more and more employees use their own mobile...more

Jackson Lewis P.C.

Cyber Security Awareness Needs To Last Beyond October

Jackson Lewis P.C. on

The U.S. Department of Homeland Security (DHS) has designed October as National Cyber Security Awareness Month. But as we leave October, remember that data security is an ongoing challenge that requires continued vigilance...more

Williams Mullen

In FTC v. Wyndham Worldwide, Third Circuit Upholds FTC Authority to Enforce Flawed Cybersecurity Measures

Williams Mullen on

In a much anticipated decision, the Third Circuit Court of Appeals affirmed the authority of the Federal Trade Commission (FTC) to enforce actions against companies who have been subject to a data breach. The FTC sued...more

Bennett Jones LLP

Privacy Commissioners Issue Joint Guidance on Bring Your Own Device Programs

Bennett Jones LLP on

An organization’s information can be put at risk when staff begin to bring their own devices and use them in the workplace. As a result, in such cases, an organization should consider adopting an appropriate “bring your own...more

Foley & Lardner LLP

Cybersecurity Update - July 2015

Foley & Lardner LLP on

Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more

McDermott Will & Emery

Start with Security

On June 30, 2015, the Federal Trade Commission (FTC) published “Start with Security: A Guide for Businesses” (the Guide). The Guide is based on 10 “lessons learned” from the FTC’s more than 50 data-security...more

WilmerHale

A Primer on FTC Expectations for Your Partner and Vendor Relationships: Enforcement Shows You Are Your Brother’s Keeper

WilmerHale on

With all of the privacy and data security enforcement actions brought by the Federal Trade Commission in recent years, and with all of the guidance distributed by the FTC in that time frame, it is easy to get caught up in...more

BakerHostetler

Cybersecurity is a Real Risk, So Become “Compromise Ready”

BakerHostetler on

Many have heard that “it is not a matter of if a company will be attacked, but when.” Statements like this used to be met with skepticism – companies would say we do not have information hackers want, we outsource our...more

16 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide