News & Analysis as of

Security and Privacy Controls Risk Management

Lathrop GPM

Is AI Putting Your Organization at Risk?

Lathrop GPM on

AI tools often drive efficiency and save money, but they have drawbacks. Here’s what to know....more

Nutter McClennen & Fish LLP

Are You Using AI to Process Consumer Information? Revisit Your Privacy Policy First!

What is a Privacy Policy? A company’s privacy policy details its commitments regarding the handling and use of consumer data. The policy must explicitly define the company’s practices for collecting, storing, processing, and...more

BakerHostetler

Looking in the Mirror: HHS OIG Audit Demonstrates HHS Agency’s Own Need for Focus on Cloud Security

BakerHostetler on

The OIG, the nation’s leader in fighting fraud, waste and abuse of Medicare, Medicaid and other HHS programs, periodically publishes reports on how federal healthcare programs could improve....more

Holland & Knight LLP

SEC Cyber Enforcement Update: Which Way Are the SolarWinds Blowing?

Holland & Knight LLP on

The SEC has been aggressively pursuing cybersecurity investigations and enforcement actions against public companies and foreign private issuers. In these actions, the SEC often alleges one of two theories: 1) that the...more

BakerHostetler

The SEC’s Regulation of Cybersecurity Continues

BakerHostetler on

The Securities and Exchange Commission entered into a resolution agreement with R.R. Donnelley & Sons (RRD) on June 18, 2024 with RRD agreeing to pay $2.125 million to resolve disclosure and control violations alleged by the...more

Fenwick & West LLP

Cyber Resilience After the Change Healthcare Breach

Fenwick & West LLP on

More than two months after the February 2024 Change Healthcare cyber-ransom attack, the healthcare industry continues to grapple with the fallout, creating significant challenges, disruptions, and outages to the healthcare...more

Benesch

Annual Report to Congress on Breaches of Unsecured Protected Health Information

Benesch on

The U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR) recently published an executive summary (Report) outlining key enforcement activities of the Health Insurance Portability and...more

Morris, Manning & Martin, LLP

Navigating Work Calls Without Privacy

A BP executive's husband pleaded guilty to securities fraud for buying and selling stock of BP's merger target. He knew of the upcoming transaction because he and his wife worked from home approximately 20 feet from each...more

Robinson+Cole Data Privacy + Security Insider

Tune Up Processes Around Passwords and Access Controls

A new report from Beyond Identity focuses on old, but very important issues—ending  access rights to network systems by terminated employees and the rampant sharing of passwords....more

NAVEX

4 Things to Know About Updated NIST 800-53 Standards

NAVEX on

[author: Matt Kelly] In September 2020 the National Institute of Standards and Technology (NIST) unveiled the fifth version of its cybersecurity standard formally known as SP 800-53, “Security and Privacy Controls for...more

BCLP

Work From Home Cybersecurity Basics: Incident Response Planning in a WFH Environment (United States)

BCLP on

As the Covid-19 Pandemic forces more employees than ever before to work from home (“WFH”), businesses face new and different data privacy and security risks. This change is not lost on U.S. regulators, but it does not mean...more

Nutter McClennen & Fish LLP

COVID-19 Security Alert: 10 Reminders for Employees Working Remotely

The security and confidentiality of a company’s data is paramount. As businesses grapple with the COVID-19 pandemic and the need for employees to work remotely, it is important to remain focused on ensuring the security and...more

Miller Canfield

Cybersecurity and Business Liabilities to Avoid When Using Remote-Work Technology

Miller Canfield on

As employers respond to the ongoing COVID-19 coronavirus pandemic, many are implementing work-from-home policies and establishing situational teleworking opportunities for their employees. While remote-work technology can...more

Barnea Jaffa Lande & Co.

Protect Your Business by Learning How to Handle Data

We are living in the age of data and big data, where everyone wants to collect as much information as possible. The ability to analyze and monetize such information is a key strategy and selling point for many businesses. ...more

Latham & Watkins LLP

The Pervasive Threat of Business Email Compromise Fraud - and How to Prevent It

Latham & Watkins LLP on

Eliminating the risk of business email compromise (BEC) attacks requires all parties to a financial transaction to pay close attention to email security, financial controls, and communication protocols. Key Points: ...more

Faegre Drinker Biddle & Reath LLP

The SEC’s Most Detailed Cybersecurity Guidance to Date

The SEC, through its Office of Compliance Inspections and Examinations (“OCIE”), recently issued its most detailed cyber guidance to date. OCIE had previously issued several cybersecurity risk alerts over the past few years....more

Dorsey & Whitney LLP

Cybersecurity: Key Considerations Developed by OCIE

Dorsey & Whitney LLP on

The SEC’s Office of Compliance Inspections and Examinations published a series of observations gleaned from thousands of exams over a period of years. While OCIE’s charge is the inspection of certain SEC registrants the...more

WilmerHale

NIST Releases Privacy Framework

WilmerHale on

On January 16, the Commerce Department’s National Institute of Standards and Technology (NIST) released version 1.0 of its Privacy Framework: A Tool for Privacy Through Enterprise Risk Management. The product of a two-year...more

McDermott Will & Emery

CCPA and ‘Reasonable Security’: A Game Changer

McDermott Will & Emery on

On January 1, 2020, the California Consumer Privacy Act of 2018 (CCPA) went into effect. The CCPA applies to a wide range of companies and broadly governs the collection, use and sale of personal information of California...more

WilmerHale

National Institute of Standards and Technology Releases Privacy Framework To Help Companies To Address Privacy Risks

WilmerHale on

On January 16, the Commerce Department’s National Institute of Standards and Technology (NIST) released version 1.0 of its Privacy Framework: A Tool for Privacy Through Enterprise Risk Management. The product of a two-year...more

Nutter McClennen & Fish LLP

Code Blue: Cybersecurity Vulnerabilities for Medical Device Makers Require Urgent Care

Q: How is the shift of medical devices moving to the Internet of Things affecting the health care industry? A: Connected medical devices routinely record sensitive health information about a patient. This critical...more

BCLP

Countdown to the CCPA: What are the Potential Costs of a Data Breach?

BCLP on

When the California Consumer Privacy Act (“CCPA”) takes effect in January 2020, California will become the first state to permit residents whose personal information is exposed in a data breach to seek statutory damages of...more

White and Williams LLP

A Yelp From Posting on Yelp®

White and Williams LLP on

Are your employees instructed on the proper (and improper) use of social media? Does your organization have policies and provide training on the appropriate handling of sensitive information? A recent United States Department...more

Epiq

The Data Breach “Blame Game” – Employer or Employee Liability

Epiq on

Data security and privacy is a hot global topic right now. New laws that closely regulate data security practices seem to be popping up everywhere in order to account for all of the data people transmit electronically daily....more

Holland & Hart LLP

3 Tips to Protect Real Estate Agents & Firms from Cybercrime

Holland & Hart LLP on

Did you know Americans lost nearly $150 million dollars to real estate internet scams last year? That makes real estate cyber crime a greater risk to Americans than identity theft ($100 million in losses) or credit card fraud...more

66 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide