Do you want a simple way to keep current on important privacy changes? Avoid sleepless nights wondering whether you missed a privacy speed bump or pothole between annual updates? Worry no longer. Troutman Pepper is pleased to...more
Barely one month after the Court of Justice of the European Union (CJEU) issued its Schrems II decision striking down the EU-U.S. Privacy Shield Framework (Privacy Shield), Austrian privacy activist Max Schrems has filed 101...more
9/2/2020
/ Consumer Privacy Rights ,
Court of Justice of the European Union (CJEU) ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Protection Authority ,
EU ,
EU-US Privacy Shield ,
Foreign Intelligence Surveillance Act ,
General Data Protection Regulation (GDPR) ,
International Data Transfers ,
Personal Data ,
Popular ,
Safe Harbors ,
Standard Contractual Clauses
On July 16, 2020, the Court of Justice of the European Union (CJEU), the supreme court of the European Union on matters involving European Union law, issued its long anticipated decision in the “Schrems II” case ( case...more
7/21/2020
/ Court of Justice of the European Union (CJEU) ,
Cybersecurity ,
Data Processors ,
Data Protection ,
EU ,
EU-US Privacy Shield ,
General Data Protection Regulation (GDPR) ,
International Data Transfers ,
Ireland ,
Personal Data ,
Personally Identifiable Information ,
Schrems I & Schrems II ,
Standard Contractual Clauses
Gregory J. Nowak, a partner and practice leader for hedge funds in Pepper Hamilton’s Private Fund Services Practice Group, hosts a series of candid, interactive webinar discussions for West LegalEdcenter on what is going on...more
1/10/2020
/ Alternative Investment Funds ,
Asset Management ,
Brokerage Accounts ,
Brokers ,
Cyber Insurance ,
Cybersecurity ,
Data Management ,
Data Privacy ,
Data Protection ,
Data Security ,
Fund Managers ,
Hedge Funds ,
Intellectual Property Protection ,
Investment Companies ,
Investment Funds ,
Investment Management ,
Popular ,
Private Equity ,
Private Equity Firms ,
Private Equity Funds ,
Registered Funds ,
SMAs
Despite focused media coverage and a steady increase in the number of data breaches involving public companies, there has not been a corresponding increase in shareholder securities fraud and shareholder derivative claims...more
4/2/2018
/ Corporate Counsel ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Derivative Suit ,
Disclosure Requirements ,
Form 10-K ,
Material Misrepresentation ,
Publicly-Traded Companies ,
Risk Management ,
Rule 10(b) ,
Rule 10b-5 ,
Securities Fraud ,
Securities Litigation
A covered entity will need to arrange for someone to perform the CISO function, dedicate resources to conduct periodic risk assessments, develop and implement policies and procedures, and retain appropriate personnel and...more
1/26/2017
/ Banking Sector ,
Chief Information Security Officer (CISO) ,
Covered Entities ,
Cybersecurity ,
Cybersecurity Framework ,
Data Breach ,
Data Protection ,
Financial Institutions ,
Financial Services Industry ,
Insurance Industry ,
NYDFS ,
Personally Identifiable Information ,
Risk Assessment ,
Risk Management
Businesses today have their work cut out for them. Small or large, no organization is immune from cybersecurity threats. Added pressures arise from stepped up government regulatory oversight and enforcement that targets an...more
12/9/2016
/ Cybersecurity ,
Cybersecurity Framework ,
Data Protection ,
Data Security ,
Federal Trade Commission (FTC) ,
FTC v Wyndham ,
Information Technology ,
NIST ,
Oracle ,
Popular ,
Risk Management ,
Section 5
In light of numerous recent data breaches, cybersecurity has emerged as an issue impacting organizations ranging from the local hardware store to the largest multi-national firms in the world. In short, no industry is immune...more
9/17/2015
/ Banking Sector ,
Breach Notification Rule ,
CAN-SPAM Act ,
COPPA ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
FERPA ,
Financial Institutions ,
Gramm-Leach-Blilely Act ,
Hackers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Healthcare ,
HITECH Act ,
OCR ,
Personally Identifiable Information ,
Privacy Laws ,
Verizon
Not worried about cybersecurity at your financial institution? Then you are in the minority. Cyber-risk was identified as the number one worry of bank risk managers at a panel of bank chief risk officers at the American...more
In This Presentation:
- Regulatory expectations for financial institutions
- Risks for financial institutions
- Planning to reduce risks
- The Breach
- Duties and responsibilities
-...more
6/23/2015
/ Banking Sector ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Enforcement ,
FFIEC ,
Financial Institutions ,
Regulatory Agencies ,
Regulatory Oversight ,
Risk Assessment ,
Security and Privacy Controls ,
Strategic Planning
Historically, the Federal Trade Commission (FTC) has been the most active federal regulator of data privacy and security. Since its creation, it has pursued hundreds of cases against companies that violated privacy statutes...more
U.S. District Judge Stanley R. Chesler of the District of New Jersey recently provided much needed guidance to directors and officers on their duties and responsibilities with regard to cybersecurity. In Palkon v. Holmes, et...more
In This Presentation:
- WHY IS DATA PRIVACY AND SECURITY IMPORTANT?
..Why is it important to protect data?
..SEC Cybersecurity Risk Alert
..FINRA Scrutiny
- BEFORE THE BREACH
...more
Pepper partners Gregory J. Nowak and Angelo A. Stio III discussed data privacy and cybersecurity issues for investment funds during a recent webinar for West LegalEdcenter. This podcast is a recording of their...more
11/10/2014
/ Cyber Attacks ,
Cyber Insurance ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data-Sharing ,
Financial Industry Regulatory Authority (FINRA) ,
Investment Management ,
Personally Identifiable Information ,
Popular ,
Securities and Exchange Commission (SEC)