Latest Posts › Cybersecurity

Share:

Bracing for 2023: 10 Steps to Prepare for a New Era in U.S. Privacy

On July 7, Colorado joined California and Virginia as the third state to pass comprehensive consumer privacy legislation. All three states have new privacy laws with effective dates in 2023 (though California’s Privacy Rights...more

DFS Continues Focus on Cybersecurity: Issues Ransomware Guidance and Signals Increased Enforcement Actions

The New York State Department of Financial Services (DFS) is continuing its focus on financial institutions’ cybersecurity, issuing new guidance, probing cybersecurity as part of routine examinations, and signaling increased...more

Biden Administration Issues Practical Guidance for Ransomware Attacks

On June 2, 2021, President Biden issued a memorandum providing "recommended best practices" for protecting against ransomware. The memorandum urged corporate executives and business leaders to...more

Spring Is Hot for State Privacy Legislation

It’s a hot spring for state privacy legislation. Privacy bills are pending in roughly 20 states, and while Gramm-Leach-Bliley Act (GLBA) exemptions may act as a cool breeze in some, issues remain...more

Florida's New Privacy Bill Promises Big Changes

Florida recently joined a small but growing number of states considering sweeping reforms to their data privacy and protection laws. House bill 969, titled “Consumer Data Privacy,” in many ways mirrors the California Consumer...more

Final CCPA Regulations Submitted, but Compliance Burden Could Increase

The California Consumer Privacy Act (CCPA) took effect on January 1, 2020, and brought with it a panoply of new legal obligations for many companies doing business with California residents. ...more

10 Privacy Recommendations for Health App Developers From the AMA’s Latest Privacy Principles

There has been no lack of new guidance regarding health care cybersecurity in recent weeks. But the American Medical Association’s (AMA) newly released “Privacy Principles” is unique in its aim at entities involved in health...more

NAIC Restarts Its Work Revising Its Model Privacy Provisions

After a brief hiatus due to COVID-19, the NAIC’s Privacy Working Group returned to work on May 5 discussing comments received on the working group’s markup of the NAIC Insurance Information and Privacy Protection Model Act...more

Five Steps to Prepare for Telehealth Data Breach Litigation

As we’ve previously reported, COVID-19 has caused a surge in telehealth and has temporarily reduced the HIPAA Security Rule requirements placed on telehealth service providers. ...more

Six Steps to Protect Against Increased Telehealth Cybersecurity Dangers

Last week, the American Medical Association (AMA) and the American Hospital Association (AHA), recognizing the increased cybersecurity threats facing health care providers, issued joint guidance for physicians working from...more

OCIE Continues Relentless Cybersecurity Focus

The level of attention that the SEC’s Office of Compliance Inspections and Examinations has been giving to cybersecurity issues can hardly be overstated. ...more

Spring Cleaning on the NAIC Model Privacy Laws

Recognizing that the NAIC’s model consumer data privacy laws have not been revised since 2017, the NAIC Privacy Protections Working Group (Privacy WG) is dusting off the NAIC Insurance Information and Privacy Protection Model...more

Privacy and Cybersecurity Perils in Hastily Signed Work-From-Home Vendor Contracts

COVID-19 spurred an overnight surge in demand for work-from-home vendors. These include companies offering audio and videoconferencing services, cloud services, e-commerce platforms, and virtual desktop infrastructure, to...more

COVID-19 and Cybersecurity: Best Practices in an Uncertain Landscape

For many people and organizations, COVID-19 caused a rapid transition to remote learning and working; for hackers and other bad actors, it has created new opportunities. Whether by virtue of a remote and distracted workforce,...more

Here Are Seven Phrases That Can Help Your Business Avert Cybersecurity Attacks

It starts inconspicuously enough with an email. You’re busy, so without thinking, you quickly open it and view the attachment. You may have just compromised the security of your entire company and the privacy of every...more

41 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide