News & Analysis as of

Security Breach

71% of U.S. Federal Agencies Have Reported Cybersecurity Breaches!

by Foley & Lardner LLP on

Darkreading.com reported that “Federal agencies must protect sensitive data and both thwart bad guys hunting for citizens’ private data and nation-state hackers with their own agendas — in addition to grappling with perennial...more

Alabama Becomes 50th State to Enact Data Breach Notification Law

Alabama has joined the “crazy quilt” of state data breach notification laws with the governor’s signature of the Alabama Data Breach Notification Act of 2018. Things to take note of under the Alabama law...more

Web Exclusive: "It Can’t Happen Here, Can It?” Now Is The Time To Assess Your School’s Safety And Security Protocols

by Fisher Phillips on

Recent events at Marjory Stoneman Douglas High School in Parkland, Florida have caused many in the education community to think about their own campuses and the safety and security measures they have employed over the years....more

Restoring “Balance” To The (Work)Force: The Board Clarifies Its Tests To Determine When “Protected Activity” Becomes Unprotected

by Seyfarth Shaw LLP on

Seyfarth Synopsis: The Board affirms an employer’s decision to discharge an employee for engaging in dishonesty and a security breach. In the process, it clarifies the legal standards to be used when assessing whether...more

Impulse Control? NLRB Finds Employee’s Misconduct To Be Deliberate and “Predetermined” and Not Protected

The past few weeks on the Labor Board front have been fairly routine, save for, of course, the high drama associated with the NLRB reversing its own decision (lest anyone think this is a super significant development,...more

The Numbers Do Lie: How Thieves Can Steal Your Cell Phone Number And Wreak Havoc On Your Life

by Dickinson Wright on

If you have an online account, you are familiar with the username/password method of user authentication. If you have been paying attention to recent news stories, however, you also recognize that this method of...more

Does Being Fit Increase Your Company’s Risk of Security Breaches?

by Fisher Phillips on

As we are early into the new year, for many, hope springs eternal to get in shape during 2018. Many of us wear some kind of fitness activity tracker that monitors steps, heart rate, calories, sleep patterns, etc. Recent news...more

$64 Million in Bitcoin Stolen from NiceHash

Many are lamenting not purchasing bitcoin now that its value has skyrocketed. Yesterday, Massachusetts Secretary of State William Galvin warned investors to stay away from investing in bitcoin, as he considers it a financial...more

The Numbers Don’t Lie: The SEC Pursues a More Streamlined Enforcement Agenda

One of the most eye-catching items in the recently released 2017 Annual Report of the Enforcement Division of the Securities and Exchange Commission (SEC or the Commission) is the significant decline in enforcement activity...more

Pros and Cons of Hiring a Security Rating Agency

by Patrick Law Group, LLC on

One can hardly check out any news outlet today without reading or hearing about a security breach. Experts frequently advocate performing internal assessments to identify security weaknesses. Commentators tout the...more

Internet of Things (IoT) Poses Information Governance Challenges for Organizations - Nextra Solutions

by Nexsen Pruet, PLLC on

The Internet of Things (“IoT”) seems to impact every aspect of life. IoT generally refers to computing devices embedded in everyday objects that collect data. From thermostats to driver-assisted cars, innumerable devices...more

“GLB” and What it Means for Auto Dealers

by Fisher Phillips on

Developing an information security program is good business, and for auto dealers that are considered “financial institutions” under the Gramm-Leach-Bliley Act (GLB) it is the law. As part of the GLB, the Federal Trade...more

New Cybersecurity Rules for Colorado Investment Advisers and Broker-Dealers

by Snell & Wilmer on

Colorado has adopted new rules that add cybersecurity requirements for certain entities with Colorado securities licenses. The rules are from the regulatory agency the Division of Securities. It licenses securities...more

This Week in FCPA-Episode 55, the Covfefe Edition

by Thomas Fox on

This week, Jay and I have a wide-ranging discussion on some of the week’s top compliance related stories. We discuss: 1. Brazilian meatpacker JBS agrees to the largest fine ever for fine for bribery and corruption, $3.2bn...more

Meritas Data Protection & Privacy Law: Getting ready for the new GDPR: Issues to consider now

The Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and...more

Better Late Than Never: New Mexico on the Cusp of Enacting Data Breach Notification Statute

We are anxiously waiting to learn the fate of the data breach notification statute recently passed by state lawmakers in New Mexico. The bill remains on the desk of the governor who has until the end of the week to sign the...more

Security Breaches Costly and Inevitable?

by Fisher Phillips on

Yahoo recent announcement that CEO Marissa Mayer would forego a 2017 stock award (after giving up a 2016 cash bonus) following security breaches in 2014, 2015 and 2016 underscores the importance of having a security team in...more

The February 2017 Update – The Mintz Matrix

During 2016, amendments to breach notification laws in five states went into effect (California, Nebraska, Oregon, Rhode Island and Tennessee). And by the end of last year, well over twenty states had introduced or were...more

Top Developments/Headlines in Trade Secret, Computer Fraud, and Non-Compete Law in 2016

by Seyfarth Shaw LLP on

Continuing our annual tradition, we present the top developments/headlines for 2016 in trade secret, computer fraud, and non-compete law. Please join us for our first webinar of the New Year on February 2, 2017, at 12:00 p.m....more

[Webinar] HIPAA in the Cloud – OCR Guidance on HIPAA and Cloud Service Providers - Jan. 31st, 1:00pm ET

by Davis Wright Tremaine LLP on

As the health care sector further embraces the benefits of cloud computing, numerous challenges have arisen with applying HIPAA to cloud computing services....more

Adobe Settles With 15 States For 2013 Data Breach

by King & Spalding on

Adobe Systems, Inc. (“Adobe”) agreed to settle an investigation by 15 states related to an incident in 2013 in which Adobe was the victim of a data security breach that exposed the user name, account information, and credit...more

Preparing for a Data Security Breach: Ten Important Steps to Take

Is your company prepared to respond to a data security breach? For many companies, even reading this question causes some anxiety. However, being prepared for what seems like the inevitable—a security breach—can be the...more

The Subject Access Request That Led to a Security Breach, or Why Having a System to Respond to Access Requests Is Essential

by Reed Smith on

In August, the UK’s data protection regulator, the ICO, fined a Hertfordshire GP practice £40,000 under the Data Protection Act 1998 (“DPA”) after a subject access request (“SAR”) went badly wrong. A lack of process, training...more

U.S. Chamber Releases Results of Data Privacy Consumer Poll Showing Non-Partisan Consensus on Legal Reform

by Reed Smith on

In an election season in which it seems Americans cannot agree on much, a new poll shows that data privacy and security reform is a unifying issue. The U.S. Chamber of Commerce Institute for Legal Reform (ILR) has...more

Summer Round-Up: Four States Bolster Data Breach Notification Laws and More Changes on the Way

As has become typical in the data security space, there was quite a bit of activity in state legislatures over the previous year concerning data breach notification statutes. Lawmakers are keenly aware of the high profile...more

45 Results
|
View per page
Page: of 2
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.