Sophisticated phishing scams and muscular hacking efforts continue to compromise personal and sensitive information held by insurers, hospital systems, and businesses large and small. In response, many states have...more
6/15/2016
/ Breach Notification Rule ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Encryption ,
Exemptions ,
Gramm-Leach-Blilely Act ,
Hackers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
HITECH Act ,
Personal Data ,
Personal Information Protection Act ,
Personally Identifiable Information ,
Phishing Scams ,
PIPA ,
Safe Harbors ,
State Data Breach Notification Statutes
Dear Ned,
I understand that one of your employees will be engaging a six-month temporary assignment around Europe to scope market opportunities, and you’d like to have a better understanding of what to be thinking about...more
California Attorney General Kamala Harris has released a report of the data breaches that have been reported to her office from 2012 until 2015. Although the California data breach notification law took effect in 2003,...more
Receently, we reviewed the staggering numbers in California Attorney General Kamala Harris’ 2016 Data Breach Report.
In addition to providing a comprehensive analysis of four years of data breaches, the report provides...more
For the first Tuesday in November, we have 10 easy steps to make sure that your data breach incident response planning is viewed from that pesky point of view of a litigator....more
11/3/2015
/ Cyber Incident Reporting ,
Cybersecurity ,
Data Breach ,
Data Breach Plans ,
Data Privacy ,
Data Protection ,
Data Security ,
Email Policies ,
Personally Identifiable Information ,
Popular ,
Tone At The Top ,
Training
For your convenience, a short list of JD Supra writers covering the myriad issues raised surrounding Cybersecurity, date privacy and protection, and related matters. ...more
As all of our readers know by now, as of October 6, the US-EU Safe Harbor Framework is no more. Safe Harbor was the mechanism on which thousands of US companies (and thousands of companies based in the European Union)...more
10/22/2015
/ Data Privacy ,
Data Protection ,
Data Protection Authority ,
Data Security ,
EU ,
EU Data Protection Laws ,
European Court of Justice (ECJ) ,
International Data Transfers ,
Israel ,
Model Contracts ,
Personal Data ,
SCC ,
Schrems I & Schrems II ,
Switzerland ,
US-EU Safe Harbor Framework
While you enjoy what is left of the summer of 2015, we will kick off your week with a few privacy and security bits and bytes....more
8/4/2015
/ Cyber Threats ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Food and Drug Administration (FDA) ,
Hackers ,
Healthcare Facilities ,
Hospitals ,
Medical Devices ,
NAIC ,
Nursing Homes ,
Personally Identifiable Information
Welcome to the dog days of summer 2015. Three privacy & security bits and bytes to start your week (if you are reading this on vacation … good for you!)
1. ICYMI: Massive Data Breach at OPM Claims Victim — The Director...more
7/14/2015
/ China ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Cybertheft ,
Data Breach ,
Data Protection ,
Office of Personnel Management (OPM) ,
Personally Identifiable Information ,
Russia ,
Third-Party ,
United Nations
It’s appropriate that the “boys of summer” feature prominently in today’s post.
Strike three for the St. Louis Cardinals?
On another summer Privacy Monday in 2014, we made note of a reported hack into the Houston...more
California again has provided a model of privacy legislation for other states to follow. New Hampshire Governor Maggie Hassan recently signed into law House Bill 520 (the “Bill”), a bipartisan effort to establish guidelines...more
In the absence of any meaningful moves in Congress to enact uniform data breach notification, the states continue to make adjustments to existing laws to better protect affected residents in their states.
Connecticut is...more
In the last month, both a federal and state court denied coverage for claims relating to an insured’s handling of electronic data. In the first case, a federal court held that there was no coverage under a cyber insurance...more
6/2/2015
/ Commercial General Liability Policies ,
Credit Cards ,
Cyber Insurance ,
Cybersecurity ,
Data Protection ,
Duty to Defend ,
Electronically Stored Information ,
Errors and Omissions Policy ,
IBM ,
Security Risk Assessments ,
Travelers Property Casualty Co.
Key takeaway: The insurance applications and underwriting questionnaires prepared in connection with cyber insurance do matter.
Cyber security, and cyber insurance, have dominated the industry headlines for several...more
It’s Monday morning — do you know your privacy/security status?
Here are a few bits and bytes to start your week.
SEC to Registered Investment Advisers and Broker-Dealers: It’s Your Turn to Pay Attention to...more
5/18/2015
/ Advertising ,
Broker-Dealer ,
Brokers ,
China ,
Cyber Attacks ,
Cybersecurity ,
Data Protection ,
Digital Advertising Alliance ,
Investment Adviser ,
Investment Companies ,
Mobile Apps ,
Penn State ,
Securities and Exchange Commission (SEC)
Some privacy & security bits and bytes to start your week:
FCC to Hold Public Workshop on Broadband Consumer Privacy Tomorrow -
Over the last several months, the Federal Communications Commission has taken on a...more
4/28/2015
/ Broadband ,
Customer Proprietary Network Information (CPNI) ,
Cybersecurity ,
Data Collection ,
Data Protection ,
FCC ,
Federal Communications Act ,
Internet ,
Mobile Broadband Services ,
Mobile Devices ,
Securities and Exchange Commission (SEC)
Eager to retain its spot among the principal laboratories for domestic privacy legislation, California’s legislature is set to debate Senate Bill 178, legislation restricting state law enforcement agencies from requesting...more
By now (unless you have been under a snow drift), you have likely heard about the apparent intrusion into a database at the nation’s largest health insurer, Anthem, Inc. Rather than reiterate the facts as currently known...more
2/11/2015
/ Anthem Blue Cross ,
Corporate Counsel ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Health Insurance ,
Insurance Industry ,
Personally Identifiable Information ,
Popular ,
Risk Mitigation
Good Tuesday – The East Coast prepares for Apocalypse (Sn)ow.
In the meantime, here are three privacy-related tidbits for your day.
Privacy Concerns Cause Scale Back of Release of HealthCare.gov Data -
We...more
Three privacy/security stories that you should know as you start your week:
President Obama to Offer Cybersecurity/Privacy Previews to State of the Union Proposals -
In a series of speeches this week, President...more
sing it with me now….
Five Golden Rules…….(well, five new privacy laws/requirements)
There are five significant new privacy laws/amendments that will be effective as of New Year’s Day — January 1, 2015 — and...more
Here are three privacy stories to start your week -
1. Dear “financial institution” : how is your data security?!
Senator Elizabeth Warren (D-Mass) announced (press release) that on November 18 the Senator...more
11/25/2014
/ Black Friday ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Due Diligence ,
Financial Institutions ,
Hackers ,
Internet Retailers ,
JPMorgan Chase ,
Legislative Agendas ,
Retailers ,
Target Company ,
USPS
Welcome to the first Tuesday in November — don’t forget to vote tomorrow!
Chip-and-Pin Not Likely “Cure-All” -
There is good news in the world of retail data breaches: US merchants are finally moving away from...more
October is National Cyber Security Awareness Month. This is an opportunity to remind employees (and yourselves) about how to keep corporate networks and their own cyber lives secure. All month, we will post articles that...more
It appears that the data breach victim of the week (perhaps of the year) is The Home Depot. Brian Krebs has reported that it appears that two large dumps of purloined credit card numbers have made an appearance on the black...more