News & Analysis as of

Security Standards Information Technology

Wiley Rein LLP

[Webinar] Domain Security: DNS Security Risks and Technical & Legal Solutions - March 4th, 1:00 pm - 2:00 pm EST

Wiley Rein LLP on

The Domain Name System (DNS) is the most used service on the internet. It is the foundational technology that makes the internet possible, delivering all digital experiences and online services. The DNS is a global public...more

Robinson+Cole Data Privacy + Security Insider

C-Suite + Managers Pose Higher Security Risk to Organizations

You executives and managers who are in my age group (that is, you didn’t grow up with mobile devices and computers) listen up. According to several studies, you pose a higher security risk to your organization than the...more

Hogan Lovells

UK Government calls for feedback on regulation of IoT device security

Hogan Lovells on

Following the UK Government's announcement in January 2020 that it would be moving forwards with regulation on consumer IoT device security, the Government has now published its legislative proposals and is seeking feedback...more

King & Spalding

Quarantine Your Sensitive Business Information to Avoid Inadvertent Tipping Liability

King & Spalding on

If you are reading this during April 2020, you’re probably reading it from somewhere in your own home — and probably near the friends and loved ones with whom you’re living in close quarters during this time of remote work,...more

Morgan Lewis - Tech & Sourcing

Contract Corner: Key Differences Between SaaS and On-Premise Software Agreements

There are two primary models by which vendors will make software available to customers (1) software as a service (SaaS); and (2) on premise. In a SaaS model, the vendor provides, maintains, and hosts (either itself or...more

Carlton Fields

Are You in Compliance With New York’s Newest Requirement to Develop, Maintain, and Implement Reasonable Safeguards to Protect New...

Carlton Fields on

The new data security requirements provision of New York’s Stop Hacks and Improve Electronic Data Security (SHIELD) Act went into full force as of March 21, 2020, and all people and businesses, regardless of the state in...more

Morgan Lewis - Tech & Sourcing

Update: Security Requirements under New York SHIELD Act to Go Into Effect

One of the major changes introduced by the Stop Hacks and Improve Electronic Data Security (SHIELD) Act, which was signed into New York law last year, is scheduled to take effect this week. ...more

K2 Integrity

Tailgating – How to Avoid Physical Security Breaches

K2 Integrity on

Tailgating is a physical security breach in which an unauthorized person gains access to a building or other protected area, usually by waiting for an authorized user to open and pass through a secure entry and then following...more

Epstein Becker & Green

The New York State “Stop Hacks and Improve Electronic Data Security Act” (SHIELD Act) Becomes Effective March 21, 2020: Is Your...

Time is running out. The effective date of New York’s cybersecurity law mandating that organizations implement an information security program to protect “private information” of New York State residents, including employee...more

Hogan Lovells

UK Government set to move forwards with regulation on consumer IoT device security

Hogan Lovells on

UK Government set to move forwards with regulation on consumer IoT device security The UK Government has just announced that it intends to draw up legislation aimed at ensuring that all consumer smart devices sold in the UK...more

Polsinelli

States’ Data Breach Notification Statute Amendments in Quarters 3-4 of 2019

Polsinelli on

From late June 2019 through mid-October 2019, a handful of states amended their data breach notification statutes. Specifically, six states amended their states to (1) require notice to the State Attorney General, (2) broaden...more

Littler

The New York SHIELD Act: What Employers Need To Know

Littler on

As mega-breaches heighten concern about the security of personal information and a federal solution does not appear forthcoming, New York recently joined the growing list of states imposing their own security obligations on...more

Robinson+Cole Data Privacy + Security Insider

U.S. Cyber Command Issues Warning About Microsoft Outlook Vulnerability

Hackers are targeting U.S. government networks, according to U.S. Cyber Command, which says there is a vulnerability of CVE-2017-1174, which is a two year old flaw in Microsoft Outlook that is being used by attackers to...more

Kramer Levin Naftalis & Frankel LLP

OCIE Warns That Investment Advisers and Broker-Dealers Are Putting Investor Information at Risk

The SEC’s Office of Compliance Inspections and Examinations (OCIE) issued a risk alert warning that investment advisers and broker-dealers “[do] not always use the available security features” on various network storage...more

Hogan Lovells

China marches into cybersecurity classified protection 2.0 - May 2019

Hogan Lovells on

The cybersecurity classified protection regime attracted significant attention when it was included in the Peoples Republic of China (PRC) Cyber Security Law promulgated in 2017 (the CSL). The CSL mandates that network...more

Hogan Lovells

Data Protection Authority of Baden-Württemberg Issues First German Fine Under the GDPR

Hogan Lovells on

In the first fine issued by a German data protection authority under the European General Data Protection Regulation (“GDPR”), on 21 November 2018 the authority of the German state of Baden-Württemberg (“LfDI”) imposed a fine...more

Hogan Lovells

California Passes First-Of-Its-Kind Law Focused on Internet of Things Cybersecurity

Hogan Lovells on

Late last month, California Governor Jerry Brown signed the first US Internet of Things (IoT) cybersecurity legislation: Senate Bill 327 and Assembly Bill 1906. ...more

Ballard Spahr LLP

California Poised to Enact Internet of Things Information Security Law

Ballard Spahr LLP on

California is once again poised to set the standard for privacy and data security by enacting the first state law directed at securing Internet of Things (IoT) devices. The law has passed the state legislature and is awaiting...more

K2 Integrity

Don’t Let Hackers Profit from Your Privacy

K2 Integrity on

These days, data sharing is more than a business—it’s an industry. Every day, data aggregators and brokers comb the internet for personal information. Because they rarely engage directly with us, we are dangerously unaware of...more

Hogan Lovells

China moves to implement security review of network products and services: but leaves foreign investor and manufacturer concerns...

Hogan Lovells on

On 4 February 2017, the Cyberspace Administration of China issued a draft of the Network Products and Services Security Review Measures (“Draft Measures”) for public comment: the Draft Measures remain open for comments until...more

20 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide