News & Analysis as of

Security and Privacy Controls Data Protection Today's Popular Updates

Epiq

After a Data Breach: Navigating Long-Tail Legal and Financial Risks

Epiq on

In recent years, data breaches have escalated from isolated technical issues to significant legal battles. Businesses are witnessing a sharp rise in data breach lawsuits, underscoring the growing legal risks associated with...more

Jackson Lewis P.C.

New York SHIELD Act FAQs

Jackson Lewis P.C. on

Over the past few months, businesses across the country have been focused on the California Consumer Privacy Act (CCPA) which dramatically expands privacy rights for California residents and provides a strong incentive for...more

Epiq

Salesforce Data Breach: Consumers Fight Back

Epiq on

California continues to lead on data privacy protection. Since the adoption of the California Consumer Privacy Act (CCPA), cracking down on data breaches and promoting consumer privacy has remained a priority in the state....more

Pillsbury Winthrop Shaw Pittman LLP

Nonprofits and New Cybersecurity and Privacy Laws in New York and California

New cybersecurity and data privacy laws will impose substantial new obligations on businesses that collect information about residents of those states. Regardless of their location or size, nonprofit organizations that...more

Pillsbury Winthrop Shaw Pittman LLP

New York Expands Cybersecurity and Data Breach Law

New law in New York State extends requirements on companies doing business with New York residents to have cybersecurity programs and expands New York’s breach notification requirements. New law extends the reach of New...more

Williams Mullen

Due Diligence of Corporate Data Assets In M&A Transactions: Data Protection/Privacy

Williams Mullen on

As data are quickly becoming significant corporate assets, lawyers need to help companies both maximize the value of their data and protect the business against any associated risks. This is particularly true in M&A...more

Sands Anderson PC

New Cybersecurity Threat Identification and Prevention Guidance from HHS

Sands Anderson PC on

As a result of ongoing efforts under the Cybersecurity Act of 2015, the Department of Health and Human Services (HHS) has partnered with public and private sector entities to develop guidance for healthcare entities seeking...more

A&O Shearman

SEC Brings Enforcement Action Against Broker-Dealer For Deficient Cybersecurity Procedures

A&O Shearman on

On September 26, 2018, the United States Securities and Exchange Commission (“SEC”) announced a $1 million settlement with an Iowa-based broker-dealer over allegations that it maintained deficient cybersecurity policies and...more

Eversheds Sutherland (US) LLP

The SEC wants companies to talk about cybersecurity

On February 21, 2018, the Securities and Exchange Commission issued an interpretive release1 providing important guidance to certain registrants on cybersecurity disclosure. Coming on the heels of dozens of high-profile...more

Benesch

Beyond Care, Custody, and Control: Data Security Best Practices for the Transportation and Logistics Sector

Benesch on

The receipt, storage, and handling of sensitive shipper data occurs, often frequently and in real-time, alongside the flow of goods. Commercial shippers are well aware of the supply chain security risk to the materials and...more

Shumaker, Loop & Kendrick, LLP

"Data Privacy Protection and Cybersecurity: A Business and Legal Primer"

The news regularly reports on data breaches and cybersecurity. While we read about the biggest breaches – Home Depot, Target, Anthem, JP Morgan, Wyndham – probably every business has been hacked and will be hacked again. ...more

BakerHostetler

2016 Mobile Data Privacy and Security Update and 2015 Review

BakerHostetler on

To say that mobile device usage has reached a tipping point would be an understatement. There are now more mobile devices than people in the world, a staggering 7.9 billion mobile devices for 7.4 billion people on Earth. In...more

Robinson+Cole Data Privacy + Security Insider

Senate passes Cybersecurity Information Sharing Act

After a long delay, with a vote of 74 to 21, the United States Senate passed the Cybersecurity Information Sharing Act (CISA) on October 27, 2015. The bill has been touted as being controversial and is opposed by...more

Brooks Pierce

What's So Great About an Information Security Policy?

Brooks Pierce on

Lawyers and compliance professionals constantly tout the importance of internal information security policies, particularly in light of data privacy problems that are reported almost daily in the media. Admittedly, drafting...more

McGuireWoods LLP

10 Million Affected by Sophisticated Cyberattack

McGuireWoods LLP on

The latest major health insurance data breach of 2015 reported by Excellus BlueCross BlueShield is considered one of the top 20 worst reported breaches of a healthcare organization. The attack affected about 7 million...more

Williams Mullen

In FTC v. Wyndham Worldwide, Third Circuit Upholds FTC Authority to Enforce Flawed Cybersecurity Measures

Williams Mullen on

In a much anticipated decision, the Third Circuit Court of Appeals affirmed the authority of the Federal Trade Commission (FTC) to enforce actions against companies who have been subject to a data breach. The FTC sued...more

Ervin Cohen & Jessup LLP

The Top 10 Priorities For Your Information Governance Program

The title, of course, begs the question: does your business even have an Information Governance Program? If not, you should get one—quick. An integrated Information Governance Program is considered a “best practice” to...more

Robinson+Cole Data Privacy + Security Insider

Audit reveals U.S. Treasury Dept. security infrastructure is weak

An annual audit conducted by the U.S. Government Accountability Office of the Fiscal Service Bureau, identified (9) nine new information security weaknesses in the U.S. Treasury Department’s information systems that are used...more

WilmerHale

Federal Trade Commission Issues “Start with Security” Guidance

WilmerHale on

On June 30, the Federal Trade Commission (FTC) issued its first guidance document as part of its Start with Security initiative. The initiative, announced by FTC Consumer Protection Director Jessica Rich in March, will...more

19 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide