Latest Publications

Share:

Department of Justice Issues First Report of Cyber-Digital Task Force

Last week, the Department of Justice (DOJ) issued the first report of its Cyber-Digital Task Force. The Task Force, which is comprised of several long-time DOJ officials, was tasked with distilling how the DOJ responds to...more

Snell & Wilmer Rolls Out Interactive Data Breach Map

Snell & Wilmer’s Breach Response Team regularly guides clients through all phases of data breach and cyber incident response, including leading internal investigations related to data breaches and cyber incidents in...more

The EU General Data Protection Regulation

This Friday is the deadline for General Data Protection Regulation (“GDPR”), yet many companies are still in the process of planning for compliance. Companies not able to meet the deadline may want to consider,...more

South Dakota’s New Breach Notification Law

On March 21, 2018, South Dakota became the 49th state to enact a breach notification law, leaving Alabama as the sole U.S. state without one. The South Dakota law will take effect on July 1, 2018. Here is a summary of several...more

FTC’s “Stick With Security” #8: Make Sure Your Service Providers Use Reasonable Security Measures

On September 15, 2017, the FTC released its eighth “Stick with Security” principle, which offers advice that individuals and organizations should consider when hiring others to process sensitive data. A few tips for making...more

FTC’s “Stick With Security” #7: Apply Sound Security Practices When Developing New Products

On September 8, 2017, the FTC released its seventh “Stick with Security” principle, which offered guidance regarding how companies incorporate security by design to prevent or minimize threats in the following ways...more

FTC’s “Stick With Security” #6: Protect Remote Access To Your Network

On September 1, 2017, the FTC released its sixth “Stick with Security” principle, which highlighted the steps businesses can take to ensure that “outside entryways” into network systems are secure. Securing remote access to a...more

FTC’s “Stick With Security” #5: Segment Your Network And Monitor Who’s Trying To Get In And Out

On August 25, 2017, the FTC released its fifth “Stick with Security” principal, which focused on how companies can protect their virtual “entrances and exits” and make life harder for hackers. The FTC believes that the...more

FTC’s “Stick With Security” #4: Store Sensitive Information Securely & Protect It During Transmission

On August 18, 2017, the FTC released its fourth “Stick with Security” principle, which explained the importance of keeping confidential data only when needed, and securely storing the data when it must be kept. To that end,...more

FTC’s “Stick With Security” #3: Require Secure Passwords and Authentication

On August 11, 2017, the FTC released its third “Stick with Security” principle, which touched on the necessity of strong authentication practices. Secure passwords and fortified authentication practices make it that much...more

FTC’s “Stick With Security” #2: Control Access to Data Sensibly

On August 4, 2017, the FTC released its second “Stick with Security” principle, which addressed the next step a company should take after it has identified confidential data in its possession and determined what information...more

“Stick With Security” - Getting Up to Speed With the FTC’s New Initiative

Companies that have experienced data breaches or security hacks have subsequently found themselves the subject of enforcement actions by the Federal Trade Commission (“FTC”) for violating the FTC Act, due to inadequate...more

The Foreign Corrupt Practices Act’s One-Year “Pilot Program” Nears The Halfway Mark

The Foreign Corrupt Practices Act (“FCPA”) prohibits both United States and foreign corporations and nationals from offering or paying, or authorizing the offer or payment, of anything of value to a foreign government...more

FTC Round-Up: NIST Framework Compliance Is Not Enough and Looming Ransomware Enforcement Activity

On August 31st and September 7th, 2016, the Federal Trade Commission (FTC) provided guidance regarding cybersecurity standards, which companies should consider when assessing their current data security posture....more

EU Approves New “Privacy Shield” Data Transfer Accord With U.S.

On Tuesday July 12, 2016, the European Commission formally adopted the EU – U.S. Trans-Atlantic Privacy Shield data transfer deal, commonly referred to as the “Privacy Shield”. The action followed an earlier vote by...more

The Yates Memo, Ten Months Later: What We Know and What To Do

Although the Yates Memo is now ten months old, senior executives and in-house counsel still do not have clarity about how the Department of Justice (“DOJ”) will apply the Memo’s principles to corporate investigations. On...more

41 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide