News & Analysis as of

Security Risk Assessments Data Breach Data Privacy

Fisher Phillips

Missouri Adopts New Data Breach Notice Law for Insurers – The 10 Things Insurers and Licensed Entities Need to Know

Fisher Phillips on

As cybersecurity threats escalate, state legislatures across the country are tightening requirements for how insurance entities respond to data breaches – and thanks to a new law just passed several weeks ago, Missouri is...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, V 5, Issue 8, October 2024

Welcome to our eighth 2024 issue of Decoded - our technology law insights e-newsletter. Thank you for reading. EU AI Act Tightens Grip on High-Risk AI Systems: Five Critical Questions for U.S. Companies - Why this is...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Emerging Theories of Liability in the Internet of Things Era

The Internet of Things (“IoT”) has ushered in a new era of connectivity and convenience, but with it comes a host of legal issues and emerging theories of liability. As IoT devices become increasingly ubiquitous in our daily...more

HaystackID

[Webinar] Today’s Privacy Reality: AI, Assessments, Breach and DSARs - February 15th, 12:00 pm - 1:00 pm EST

HaystackID on

Today’s Privacy Reality: AI, Assessments, Breach and DSARs is a webcast that will bring together a panel of experts to discuss the impact of artificial intelligence (AI) on privacy and cybersecurity. The panel will address...more

BakerHostetler

2022 DSIR Deeper Dive: Vendor Incidents

BakerHostetler on

Vendor-caused incidents continued to surge in 2021. Nearly 20 percent of the total incidents we handled last year were caused by vendors, with more than half requiring notification....more

Guidepost Solutions LLC

Guidepost in Motion - Cybersecurity Frameworks and Metrics Part 2

Ken Mendelson welcomes back Andy Cottrell, the founder and CEO of cybersecurity consulting firm Truvantis to talk more about cybersecurity frameworks. They discuss the difference between a cyber audit and cyber assessment and...more

Lighthouse

Cybersecurity Defense: Recommendations for Companies Impacted by the Biden Administration Executive Order

Lighthouse on

As summarized in the first installment of our two-part blog series, President Biden recently issued a sweeping Executive Order aimed at improving the nation’s cybersecurity defense. The Order is a reaction to increased...more

Rivkin Radler LLP

Anthem Agrees to $48 Million Multi-State Settlements Over 2014 Data Breach

Rivkin Radler LLP on

Health insurer Anthem, Inc. has finally reached a settlement with a coalition of 41 states plus the District of Columbia, and a separate settlement with California, to resolve state attorney general investigations of a data...more

Barnea Jaffa Lande & Co.

Protect Your Business by Learning How to Handle Data

We are living in the age of data and big data, where everyone wants to collect as much information as possible. The ability to analyze and monetize such information is a key strategy and selling point for many businesses. ...more

McDermott Will & Emery

Comprehensive Federal Privacy Law Still Pending

McDermott Will & Emery on

The California Consumer Privacy Act (CCPA) has forced companies across the United States (and even globally) to seriously consider how they handle the personal information they collect from consumers. By its terms, however,...more

Brooks Pierce

Sure, Hindsight Is 20/20 But These 2020 Cybersecurity New Year’s Resolutions Will Aid In Securing Your Business

Brooks Pierce on

In this day, data is often one of the most valuable assets companies have and it needs to be protected as such. Guarding data has become crucial for every business, no matter the size and industry. In the first half of 2019,...more

Epiq

Four Things Organizations Should Do to Comply With New York’s SHIELD Act

Epiq on

In recent years, many states have been updating their data privacy laws to account for new technologies and security risks. On Oct. 23, 2019, a New York law on data breach notification requirements became effective. The Stop...more

Akin Gump Strauss Hauer & Feld LLP

Additional States Adopt Cybersecurity Requirements for Insurance Companies

Since July 1, 2019, Delaware, New Hampshire and Connecticut have enacted laws imposing new cybersecurity requirements on insurers. These laws follow similar statutes already operating in at least six other states: Alabama,...more

Sunstein LLP

Twenty Years Under the Microscope: A Small Business, a Data Breach and the FTC

Sunstein LLP on

James Grago has a nice business going. He runs a website called ClixSense.com that permits users to earn money by completing surveys and watching advertisements. Revenues grew from $6.7 million in 2015 to $9.1 million in...more

Sheppard Mullin Richter & Hampton LLP

Preparing for New York’s New Data Security Requirements

New York recently passed the SHIELD Act, which, among other things, newly establishes data security requirements for companies that collect private information about New York residents. The data security protections required...more

Fisher Phillips

New York Expands The Data Breach Umbrella: More Cybersecurity Incidents Will Require Breach Compliance From Businesses Who Possess...

Fisher Phillips on

On July 25, 2019, New York Governor Anthony Cuomo signed the Stop Hacks and Improve Electronic Data Security Act (SHIELD Act) into law. The Act creates additional protections for the residents of New York and their private...more

McDermott Will & Emery

[Event] 2019 Privacy & Cybersecurity Risk Management Series - Insights On Cybersecurity And Data Privacy For California Companies...

California has taken bold steps to regulate the privacy and security of personal information, creating unprecedented remedies for data breaches and recognized European-style rights for consumers in their data. On September...more

Faegre Drinker Biddle & Reath LLP

Further Expansion of Data Security Requirements in FTC Order with LightYear Dealer Technologies

The FTC has entered into a settlement with LightYear Dealer Technologies, doing business as DealerBuilt, a technology company that develops and sells dealer management system (DMS) software and data processing services to...more

Foley Hoag LLP - Security, Privacy and the...

China's Internet Regulator Drafts COPPA-Like Rules for Children's Data Privacy

In early June, the Cyberspace Administration of China released for public comment new draft regulations applicable to the collection of personal information relating to children under 14 by online service providers. The...more

Fenwick & West LLP

FTC Toughening Stance on Data Security – Five Key Takeaways from Recent Consent Orders

Fenwick & West LLP on

The Federal Trade Commission is putting more teeth into the multiyear compliance obligations of consent orders it enters into with companies to settle enforcement actions related to data breaches. The FTC recently issued a...more

Robinson+Cole Data Privacy + Security Insider

Cottage Health Settles with OCR for $3M

We previously reported that Cottage Health, a health care entity operating several hospitals in California, settled with the State of California for $2 million for a security incident that occurred in 2013. On February 7,...more

Sheppard Mullin Richter & Hampton LLP

States Taking Actions Against Health IT Companies Over Data Breaches

Twelve state attorneys general have brought suit against two medical Information Technology companies. The AGs allege that the companies, Medical Informatics Engineering Inc. and its subsidiary, NoMoreClipboard LLC, had poor...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Passwords Are Getting Ridiculous, Right? Consider Simplifying Your Company's Two-Factor Authentication With A Physical Security...

If you clicked on this post, that means you probably fall into one of two categories. Category 1: You are really tired of having to come up with – and remember – increasingly more complicated passwords, only to then be asked...more

Mintz - Health Care Viewpoints

Data-Harvesting Zombie Hackers, Blood-Thirsty Auditors, and Other Reasons to be Scared on Halloween

This Halloween, the scariest monsters might not be in your closet or under your bed. They may be overseas, orchestrating intrusions into your electronic medical record. Or they may be lurking in your own workforce, carrying...more

King & Spalding

“Bug Bounty” Programs Grow In Popularity

King & Spalding on

In a significant shift in the way the tech industry responds to hackers, an increasing number of companies are resorting to use of “bug bounty” programs that reward hackers who identify flaws in their company software and...more

36 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide