News & Analysis as of

Security Breach

$64 Million in Bitcoin Stolen from NiceHash

Many are lamenting not purchasing bitcoin now that its value has skyrocketed. Yesterday, Massachusetts Secretary of State William Galvin warned investors to stay away from investing in bitcoin, as he considers it a financial...more

The Numbers Don’t Lie: The SEC Pursues a More Streamlined Enforcement Agenda

One of the most eye-catching items in the recently released 2017 Annual Report of the Enforcement Division of the Securities and Exchange Commission (SEC or the Commission) is the significant decline in enforcement activity...more

2017 Security Breaches: Frequency and Severity on the Rise (Updated)

by Revision Legal on

We periodically update this post with recent data breach statistics. Now that we’re into the final quarter of 2017, it’s time to look back at the largest data breaches of 2017. This was originally published in December,...more

Pros and Cons of Hiring a Security Rating Agency

by Patrick Law Group, LLC on

One can hardly check out any news outlet today without reading or hearing about a security breach. Experts frequently advocate performing internal assessments to identify security weaknesses. Commentators tout the...more

Internet of Things (IoT) Poses Information Governance Challenges for Organizations - Nextra Solutions

by Nexsen Pruet, PLLC on

The Internet of Things (“IoT”) seems to impact every aspect of life. IoT generally refers to computing devices embedded in everyday objects that collect data. From thermostats to driver-assisted cars, innumerable devices...more

“GLB” and What it Means for Auto Dealers

by Fisher Phillips on

Developing an information security program is good business, and for auto dealers that are considered “financial institutions” under the Gramm-Leach-Bliley Act (GLB) it is the law. As part of the GLB, the Federal Trade...more

New Cybersecurity Rules for Colorado Investment Advisers and Broker-Dealers

by Snell & Wilmer on

Colorado has adopted new rules that add cybersecurity requirements for certain entities with Colorado securities licenses. The rules are from the regulatory agency the Division of Securities. It licenses securities...more

2017 Security Breaches: Frequency and Severity on the Rise

by Revision Legal on

We are only six months into 2017, and we can already tell that it is going to be a bumper year with regard to instances of data security breaches. Looking back at the hacking statistics from 2015 and 2016, we should not be...more

This Week in FCPA-Episode 55, the Covfefe Edition

by Thomas Fox on

This week, Jay and I have a wide-ranging discussion on some of the week’s top compliance related stories. We discuss: 1. Brazilian meatpacker JBS agrees to the largest fine ever for fine for bribery and corruption, $3.2bn...more

Are Healthcare Systems Being Held Hostage by Ransomware?

by Revision Legal on

Healthcare ransomware is one of the biggest cybersecurity concerns in existence and it may have particularly serious implications for healthcare systems. Ransomware is a form of malicious software code that is somehow...more

Meritas Data Protection & Privacy Law: Getting ready for the new GDPR: Issues to consider now

The Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and...more

Better Late Than Never: New Mexico on the Cusp of Enacting Data Breach Notification Statute

We are anxiously waiting to learn the fate of the data breach notification statute recently passed by state lawmakers in New Mexico. The bill remains on the desk of the governor who has until the end of the week to sign the...more

Security Breaches Costly and Inevitable?

by Fisher Phillips on

Yahoo recent announcement that CEO Marissa Mayer would forego a 2017 stock award (after giving up a 2016 cash bonus) following security breaches in 2014, 2015 and 2016 underscores the importance of having a security team in...more

The February 2017 Update – The Mintz Matrix

During 2016, amendments to breach notification laws in five states went into effect (California, Nebraska, Oregon, Rhode Island and Tennessee). And by the end of last year, well over twenty states had introduced or were...more

Top Developments/Headlines in Trade Secret, Computer Fraud, and Non-Compete Law in 2016

by Seyfarth Shaw LLP on

Continuing our annual tradition, we present the top developments/headlines for 2016 in trade secret, computer fraud, and non-compete law. Please join us for our first webinar of the New Year on February 2, 2017, at 12:00 p.m....more

[Webinar] HIPAA in the Cloud – OCR Guidance on HIPAA and Cloud Service Providers - Jan. 31st, 1:00pm ET

by Davis Wright Tremaine LLP on

As the health care sector further embraces the benefits of cloud computing, numerous challenges have arisen with applying HIPAA to cloud computing services....more

Adobe Settles With 15 States For 2013 Data Breach

by King & Spalding on

Adobe Systems, Inc. (“Adobe”) agreed to settle an investigation by 15 states related to an incident in 2013 in which Adobe was the victim of a data security breach that exposed the user name, account information, and credit...more

Preparing for a Data Security Breach: Ten Important Steps to Take

Is your company prepared to respond to a data security breach? For many companies, even reading this question causes some anxiety. However, being prepared for what seems like the inevitable—a security breach—can be the...more

The Subject Access Request That Led to a Security Breach, or Why Having a System to Respond to Access Requests Is Essential

by Reed Smith on

In August, the UK’s data protection regulator, the ICO, fined a Hertfordshire GP practice £40,000 under the Data Protection Act 1998 (“DPA”) after a subject access request (“SAR”) went badly wrong. A lack of process, training...more

U.S. Chamber Releases Results of Data Privacy Consumer Poll Showing Non-Partisan Consensus on Legal Reform

by Reed Smith on

In an election season in which it seems Americans cannot agree on much, a new poll shows that data privacy and security reform is a unifying issue. The U.S. Chamber of Commerce Institute for Legal Reform (ILR) has...more

Summer Round-Up: Four States Bolster Data Breach Notification Laws and More Changes on the Way

As has become typical in the data security space, there was quite a bit of activity in state legislatures over the previous year concerning data breach notification statutes. Lawmakers are keenly aware of the high profile...more

OCR: No privacy breach is too small

by Thompson Coburn LLP on

The Office for Civil Rights (OCR) HIPAA enforcement efforts are continuing to increase. This year, the OCR has already announced 10 HIPAA enforcement actions involving fines, which is a 67 percent increase from last year and...more

Valuable Information Security Lessons from the Olympus Mortgage vs. Guaranteed Rate Case

by Baker Donelson on

Late last month a jury awarded Mount Olympus Mortgage Company (MOMC) more than $25 million for their claims against Guaranteed Rate (Guaranteed), which alleged Guaranteed along with other former employees of MOMC illegally...more

Sixth Circuit Rules That EHR Security Breaches Do Not Violate False Claims Act

by King & Spalding on

On March 7, 2016, the Sixth Circuit Court of Appeals ruled that security breaches of individual electronic health records (“EHRs”) do not violate the HITECH Act and cannot support False Claims Act allegations. ...more

Human Error Called The Most Common Factor In Data Breaches

by Fisher Phillips on

As reported in the December 9, 2015 Wall Street Journal Law Blog, a recent report by the Association of Corporate Counsel (“ACC”) revealed that the most common reason for a data breach at companies is “employee error.” ...more

41 Results
|
View per page
Page: of 2
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.