News & Analysis as of

State Data Breach Notification Statutes Health Insurance Portability and Accountability Act (HIPAA) Cyber Attacks

BakerHostetler

It’s Elementary: Measures that Educational Institutions Should Take to Prepare for Ransomware Attacks: Part 3

BakerHostetler on

In the event of a ransomware attack, there are a host of legal frameworks that could potentially be implicated. Whether those laws apply often depends on the nature of the data that the threat actor accessed and/or acquired....more

Burr & Forman

Data Breach Notification Laws in the United States: What is Required and How is that Determined?

Burr & Forman on

Has your business considered what obligations you would have to notify people in the event of a cyber-attack that compromises some or all of your IT systems? Have you cataloged all the data you collect and where it is stored...more

Polsinelli

Recent Amendments to State Breach Notification Laws

Polsinelli on

Over the last several months, a minority of states amended their data breach notification statutes or enacted sector-specific breach notification requirements. ...more

Moore & Van Allen PLLC

Two Proposed Data Security Laws Reflect National Trend Toward Affirmative Responsibilities

With major consumer data breaches making headlines on a semi-regular basis, legislators around the country are starting to hold businesses more accountable for cybersecurity compliance. Industry-specific laws such as HIPAA...more

Pullman & Comley, LLC

ALERT: Prepare to be Ransomed: A Primer on Legal Obligations Before and After Ransomware Strikes

Pullman & Comley, LLC on

According to a recent U.S. Government Interagency report, ransomware is the fastest growing malware threat, targeting users of all types. An incredible 51 percent of respondents in a January 2017 study by the Ponemon...more

Latham & Watkins LLP

Ransomware Attacks: When Is Notification Required?

Latham & Watkins LLP on

Ransomware is not only a growing security threat but a potentially thorny notification issue. Ransomware is one of the most prevalent cybersecurity threats afflicting businesses today. When an attack hits, a victim...more

6 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide