News & Analysis as of

Third-Party Liability Data Breach

Polsinelli

Mitigating Your Greatest Data Privacy Risk

Polsinelli on

Third-party vendors pose a significant risk - The greatest data privacy threat to companies is commonly thought to be that company’s employees. While employees can be a threat, the majority of data breaches and ...more

Stikeman Elliott LLP

Intrusion Upon Seclusion Claims In Privacy Breach Class Actions? Court of Appeal Trilogy Offers Guidance

Stikeman Elliott LLP on

In a trilogy of rulings released on November 25, 2022, the Ontario Court of Appeal (“Court”) has ruled that the tort of intrusion upon seclusion cannot extend to companies that collect and store personal information and fall...more

Kramer Levin Naftalis & Frankel LLP

Cybersecurity: the SEC Provides Guidance on Well-Known and Emerging Best Practices

At the end of January, the U.S. Securities and Exchange’s Office of Compliance Inspections and Examinations (OCIE) released its “Observations on Cybersecurity and Resiliency Practices” (Observations)....more

Akin Gump Strauss Hauer & Feld LLP

Issues to Consider when Evaluating Cyber Coverage in Light of the CCPA and Other State Privacy Laws

With the expansion of privacy legislation—from the General Data Protection Regulation (GDPR) in Europe to the coming California Consumer Privacy Act (CCPA) in the United States—cyber liability insurance is taking on increased...more

Robinson+Cole Data Privacy + Security Insider

Choice Hotels Contacts 700,000 Customers About Data Breach Caused by Vendor

In another example of a data breach allegedly caused by a vendor, Choice Hotels is contacting approximately 700,000 of its customers regarding a data breach caused by a third-party vendor that “copied the impacted data from...more

Womble Bond Dickinson

Response Options For Businesses With Sensitive Data Breaches

Womble Bond Dickinson on

Your heart raced when the caller on the phone identified himself as an FBI agent. But the conversation was matter-of-fact. About 2,500 sets of credit card information from your clients had been posted for sale on a...more

Bennett Jones LLP

Dangerous Assumptions and Serious Consequences in Cybersecurity

Bennett Jones LLP on

It's not the kind of news a retail giant wants to make. In May 2017, Target agreed to a $18.5-million settlement to resolve a 47-state investigation into a massive 2013 hack. This settlement put Target's total cost of the...more

Poyner Spruill LLP

Am I Covered Now!

Poyner Spruill LLP on

The cybersecurity breaches rippling through the global economy create enormous costs for the affected businesses and organizations. As a result, many companies are focusing increased attention on obtaining insurance coverage...more

Kilpatrick

Ransomware Cuts Deep, in Life & in Coverage

Kilpatrick on

1. Beyond Breaches - With ransomware, cybersecurity in healthcare has gone far beyond HIPAA compliance, breaches of PHI or identity theft. For the unprepared healthcare provider not able to prevent ransomware or...more

Patterson Belknap Webb & Tyler LLP

Litigation Watch: Can a Third-Party Vendor Be Left Holding the Bag After a Breach?

Many organizations, particularly those outside of the technology sector, rely heavily on third-parties—including cyber security specialists, lawyers, and public relations firms—to help pick up the pieces after a data breach. ...more

Nossaman LLP

Purchasing Cyber Insurance? Important Considerations from the Recent Nossaman/ UCI Cyber Symposium

Nossaman LLP on

On October 12, 2015, Nossaman and UC Irvine hosted a Cyber Symposium at the City Club in Los Angeles. The event included four panels of Nossaman lawyers, UCI professors, and private professionals who are experts in the areas...more

Seyfarth Shaw LLP

Liability for Data Breach Involving Employee Information: Even the Federal Government and Third Party Vendors Are Not Immune

Seyfarth Shaw LLP on

In what is quickly becoming the newest trending topic in class action litigation, another class action has been filed alleging the disclosure of employee personally identifiable information due to a cyber attack. This...more

Troutman Pepper

The New Normal: Taking Responsibility for Your Vendors

Troutman Pepper on

As financial institutions continue to strive for reduced costs and greater efficiencies, they are increasingly turning to third-party vendors to handle a wide variety of tasks, from marketing and sales to payment processing....more

Sherman & Howard L.L.C.

Cyber Risks: Creating A Comprehensive Cyber Insurance Program

Insurance is one important line of defense companies can use to protect against the potentially devastating costs of responding to cyber breaches. The following list gives examples of insurance coverage to consider when...more

14 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide