News & Analysis as of

Data Security Policies and Procedures Data Breach

HaystackID

Safeguarding the Corporate Network Against Breaches through Information Governance

HaystackID on

While corporate leaders often view cybersecurity as a technical challenge, contributing author Phil Favro illustrates the legal and organizational dimensions of cybersecurity in this recent article. Favro emphasizes that...more

Farella Braun + Martel LLP

Understanding the Importance of Data Asset Protection: Why Wineries Need to Pay Attention to Policies and Procedures

Data asset protection is traditionally associated with industries and entities that develop or store particularly sensitive information, like tech companies, hospitals, law firms, and government entities. However, data asset...more

Downs Rachlin Martin PLLC

Protecting Your Team's Data: What Every Employer Needs to Know

Let’s talk about something that doesn’t get enough attention: protecting your employees’ sensitive personal information. In today’s digital world, keeping your team’s data safe isn’t just a nice-to-have—it’s absolutely...more

Jackson Lewis P.C.

We get Privacy for work — Episode 7: What Is a WISP and Why Your Organization Must Have One

Jackson Lewis P.C. on

Written Information Security Programs, commonly referred to as WISPs, are critical plans to have in place – not only to efficiently and effectively respond to ransomware attacks and data breaches when they occur – but to...more

Dinsmore & Shohl LLP

Recent OCR Settlements Emphasize the Need for Thorough HIPAA Risk Analysis

Dinsmore & Shohl LLP on

Two settlements recently announced by the U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR) reinforce the agency’s emphasis on promoting thorough risk analysis to help prevent disclosure of...more

Mitratech Holdings, Inc

5 Challenges in Incident Management (and How to Stay Resilient)

A single outage can spiral into hours of downtime, frustrated customers, and significant revenue loss across your business....more

Paul Hastings LLP

The Changing Cyber Threat Landscape and Lessons Learned From Data Breaches

Paul Hastings LLP on

Last month, Paul Hastings sponsored the Cybersecurity Law Workshop at the Spring Privacy & Security Forum held at George Washington University in Washington, D.C. The Cybersecurity Law Workshop featured three panels of...more

Fisher Phillips

New SEC Cybersecurity Compliance Deadlines are Coming: What 5 Things Should Covered Institutions Do to Prepare?

Fisher Phillips on

The SEC’s amended Regulation S-P, adopted last year, will soon enhance data privacy protections for broker-dealers, investment companies, registered investment advisors, and transfer agents. The updated rule requires these...more

Paul Hastings LLP

NFL Draft Provides Wake-Up Call on Protecting Confidential Information While Working Remotely

Paul Hastings LLP on

Last week’s NFL draft highlighted more than the accomplishments of athletes at the combine or on the field. While there was extensive coverage of the merits of each player, one of the major headlines coming out of the draft...more

Health Care Compliance Association (HCCA)

[Event] Healthcare Privacy Compliance Academy - June 9th - 12th, Pittsburgh, PA

HCCA's Healthcare Privacy Compliance Academy is a three-and-a-half-day interactive education program with a focus on the vast body of privacy laws and regulations in place to help you protect PHI and other critical data. Our...more

Health Care Compliance Association (HCCA)

[Event] Healthcare Privacy Compliance Academy - March 24th - 27th, Chicago, IL

HCCA's Healthcare Privacy Compliance Academy is a three-and-a-half-day interactive education program with a focus on the vast body of privacy laws and regulations in place to help you protect PHI and other critical data. Our...more

Jackson Lewis P.C.

OCR Proposed Tighter Security Rules for HIPAA Regulated Entities, including Business Associates and Group Health Plans

Jackson Lewis P.C. on

As the healthcare sector continues to be a top target for cyber criminals, the Office for Civil Rights (OCR) issued proposed updates to the HIPAA Security Rule (scheduled to be published in the Federal Register January 6). It...more

Health Care Compliance Association (HCCA)

[Event] Healthcare Privacy Compliance Academy - January 27th - 30th, Orlando, FL

HCCA's Healthcare Privacy Compliance Academy is a three-and-a-half-day interactive education program with a focus on the vast body of privacy laws and regulations in place to help you protect PHI and other critical data. Our...more

Bond Schoeneck & King PLLC

Revamping Your Cybersecurity Policies and Procedures: Tips and Tricks

As each year passes and technology advances, businesses face an increasingly difficult task to maintain adequate security measures to protect their organizations’ assets and data. With this in mind, it is important to review...more

Jackson Lewis P.C.

Key Takeaways for Healthcare Providers Following HHS OCR’s Most Recent Ransomware Investigation

Jackson Lewis P.C. on

Announcing its fourth ransomware cybersecurity investigation and settlement, the Office for Civil Rights (OCR) also observed there has been a 264% increase in large ransomware breaches since 2018....more

Bilzin Sumberg

Federal Court Makes It Harder for Plaintiffs to Bring Data Breach Claims

Bilzin Sumberg on

In a recent federal case from New York, the court dealt a blow to plaintiffs suing over data breaches. The plaintiffs had filed a putative class action suit, alleging that they (and others like them) had been harmed by the...more

Sheppard Mullin Richter & Hampton LLP

Biotech Company Settles with Three State AGs Over Security Practices

A biotech company recently settled with three AGs over allegations that it had failed to protect consumer information. According to the AGs of Connecticut, New York and New Jersey, this led to a 2023 data incident. The...more

Fisher Phillips

Insider Threats to Healthcare Data: What You Need to Know and 5 Steps You Can Take Now

Fisher Phillips on

Healthcare data breaches are occurring more frequently and on larger scales than ever before – and while you defend against cyberattacks and other external threats, make sure you do not overlook the critical role your...more

Rumberger | Kirk

Understanding How Generative AI Can Affect Your Business' Data Privacy And Ownership Is Crucial

Rumberger | Kirk on

“In assessing a generative AI product, it is critical to understand issues of data ownership and privacy. This cumbersome task is necessary to learn how the AI platform will use data, if the data shared is entering an open or...more

Health Care Compliance Association (HCCA)

[Event] Healthcare Privacy Compliance Academy - July 15th - 18th, Charlotte, NC

Ideal for professionals with some compliance knowledge and experience, HCCA’s Healthcare Privacy Compliance Academy offers practitioners a deeper understanding of effective compliance management in a healthcare setting. The...more

Mitratech Holdings, Inc

HR Compliance Demystified: A Comprehensive Guide for Employers

For HR leaders, HR compliance can sometimes seem as complex as a Rubik’s cube. In this comprehensive guide, we will demystify HR compliance for you and provide valuable insights to help your business stay on the right side of...more

Health Care Compliance Association (HCCA)

[Event] Healthcare Privacy Compliance Academy - May 6th - 9th, San Antonio, TX

Ideal for professionals with some compliance knowledge and experience, HCCA’s Healthcare Privacy Compliance Academy offers practitioners a deeper understanding of effective compliance management in a healthcare setting. The...more

Bradley Arant Boult Cummings LLP

Business Email Compromise: The Most Prevalent – and Preventable – Cyber Risk

Ransomware attacks that shut business down to zero and data breaches that disclose the personal information of customers, vendors and employees justifiably strike fear in the hearts of executives everywhere. Organizations can...more

Seyfarth Shaw LLP

Cyber Strategy: HHS Weighs in on Cybersecurity in the Healthcare Industry

Seyfarth Shaw LLP on

Seyfarth Synopsis: The health care sector faces escalating cybersecurity risks given its size, technological dependence and the sensitive nature of data used therein. According to the U.S. Department of Health and Human...more

ArentFox Schiff

Bring Your Own Device Policies: A Strategic Guide for Regulated Industries

ArentFox Schiff on

In the era of technology-driven workplaces, Bring Your Own Device (BYOD) policies have emerged as a significant trend. A BYOD policy allows employees to use their personal devices, such as smartphones, for work purposes,...more

101 Results
 / 
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide