On July 30, 2025, a wine producer was sued in connection with a cyberattack that allegedly compromised the data of at least 26,000 customers. Among other things, the complaint alleges that the company failed to implement...more
8/22/2025
/ Class Action ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Incident Response Plans ,
Personal Data ,
Popular ,
Privacy Policy ,
State Attorneys General ,
Third-Party Risk ,
Third-Party Service Provider
The recent ransomware attack against the Duvel Moortgat Brewery demonstrated the very real risk that cybersecurity incidents pose to the alcohol industry, reportedly halting operations for several days at four of Duvel...more
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) recently issued a Ransomware Profile identifying steps organizations can take to prevent, respond to and recover from...more
9/24/2021
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Loss Prevention ,
Data Privacy ,
Data Protection ,
Data Security ,
NIST ,
Popular ,
Ransomware ,
Risk Management
On January 30, the US Department of Defense (DoD) released version 1.0 of the Cybersecurity Maturity Model Certification (CMMC) framework, which will require DoD contractors and subcontractors to obtain third-party...more
2/4/2020
/ Attorney-Client Privilege ,
Certification Requirements ,
Controlled Unclassified Information (CUI) ,
Cybersecurity ,
Cybersecurity Maturity Model Certification (CMMC) ,
Defense Contracts ,
Defense Sector ,
Department of Defense (DOD) ,
DFARS ,
Federal Acquisition Regulations (FAR) ,
Federal Contractors ,
Intellectual Property Protection ,
NIST ,
Popular ,
Subcontractors ,
Supply Chain
Recent months have seen a wave of ransomware attacks in the US healthcare industry, many involving a sophisticated strain of malware called Ryuk. To protect themselves, healthcare providers should review OCR’s recent guidance...more
12/12/2019
/ Criminal Investigations ,
Cyber Attacks ,
Cybersecurity ,
Electronic Protected Health Information (ePHI) ,
FBI ,
Health Care Providers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
New Guidance ,
OCR ,
Patient Privacy Rights ,
Popular ,
Ransomware ,
US-CERT
California has taken bold steps to regulate the privacy and security of personal information, creating unprecedented remedies for data breaches and recognized European-style rights for consumers in their data.
On September...more
8/9/2019
/ Big Data ,
California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Continuing Legal Education ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Emerging Technology Companies ,
Events ,
Information Technology ,
Popular ,
Risk Management ,
Security Risk Assessments ,
State Data Privacy Laws
Information is one of your company’s most valuable assets. It is critical to remain vigilant to protect against the latest cybersecurity threats and to comply with expansive privacy obligations.
Join us in New York City for...more
5/20/2019
/ Attorney-Client Privilege ,
California Consumer Privacy Act (CCPA) ,
Continuing Legal Education ,
Cybersecurity ,
Data Privacy ,
Events ,
Health Care Providers ,
Information Management ,
Information Technology ,
Popular ,
Private Equity ,
Privileged Communication ,
Risk Management ,
Security and Privacy Controls
Privacy Shield Implementation and How-To Kit from McDermott Will & Emery -
Japanese companies may have European branches or subsidiaries that send personal data to the US or that may be accessed by entities in the US,...more