News & Analysis as of

Data Protection Data Breach Cybersecurity

Hinckley Allen

Today’s Menacing Cyber Threat Environment: What Organizations Need to Know to Quickly Respond to a Data Breach and Reduce the...

Hinckley Allen on

As the last two years have clearly demonstrated, no organization is immune from cyberattacks.  Indeed, numerous studies have reported that a majority of businesses have been impacted by at least one cyberattack over the past...more

Bond Schoeneck & King PLLC

Revamping Your Cybersecurity Policies and Procedures: Tips and Tricks

As each year passes and technology advances, businesses face an increasingly difficult task to maintain adequate security measures to protect their organizations’ assets and data. With this in mind, it is important to review...more

Jones Day

First Tranche of Australia's Much Anticipated Privacy Law Reforms Revealed

Jones Day on

The first wave of Australia's expansive privacy law reforms has been introduced into Federal Parliament in the Privacy and Other Legislation Amendment Bill 2024 (Cth) ("Bill")....more

Accelerynt, Inc.

Are You Truly Protected? The Hidden Detection Gaps in Your MSSP’s Defense Against Modern Threats

Accelerynt, Inc. on

Introduction - As organizations increasingly rely on Managed Security Service Providers (MSSPs) to monitor their systems and detect cyber threats, many believe they are well-protected against compromises and data...more

Robinson+Cole Data Privacy + Security Insider

CT AG Settles Data Breach Case with Guardian Analytics

Connecticut Attorney General William Tong announced on October 21, 2024, that his office has settled a data breach case against Guardian Analytics, Inc. for $500,000. The data breach affected the personal information of...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, V 5, Issue 8, October 2024

Welcome to our eighth 2024 issue of Decoded - our technology law insights e-newsletter. Thank you for reading. EU AI Act Tightens Grip on High-Risk AI Systems: Five Critical Questions for U.S. Companies - Why this is...more

Robinson+Cole Data Privacy + Security Insider

Microsoft Report Highlights Attacks Against Healthcare Organizations

On October 22, 2024, Microsoft issued a threat trend research report entitled “US Healthcare at risk: Strengthening resilience against ransomware attacks.” In it, Microsoft declares that ransomware attacks against the...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #418 – New Phishing Scheme Uses Scarce Weight Loss Drugs as Hook

Scammers are always looking for new ways to dupe victims. If you battle your weight, you think about it a lot and are always looking for easier ways to lose some pounds. There is no easy way, but we are always looking for an...more

Association of Certified E-Discovery...

[Webinar] What Does CISA and NIST Say About Forensic Investigations During a Breach? - November 7th, 10:00 am PST

In 2021 CISA released their Incident Response and Vulnerability Playbook, and in 2024 NIST updated their Cybersecurity Framework. Using the Playbook and Framework as a template, forensic teams can build a repeatable processes...more

Allen Matkins

SEC Continues Its Persecution Of Crime Victims

Allen Matkins on

More than a decade ago, I expressed concern about the Securities and Exchange Commission's predilection for targeting victims of crimes.   That concern related to an enforcement action against a company that had been...more

Mayer Brown

The Evolving US Privacy Landscape: Essential Insights for 2024

Mayer Brown on

The US privacy legal landscape continues to expand in 2024, with most of the momentum led by state laws. ...more

Clark Hill PLC

The Value of an Effective HIPAA Compliance Program Amid OCR HIPAA Audits

Clark Hill PLC on

In 2024, the U.S. Department of Health and Human Services Office of Civil Rights (“OCR”) Director Melanie Fontes Rainer announced that OCR will resume auditing Health Information Portability and Accountability Act (“HIPAA”)...more

Troutman Pepper

Cyber Incident Response Checklist for SEC Compliance

Troutman Pepper on

By now, public companies are generally aware of the cybersecurity rules adopted by the U.S. Securities and Exchange Commission a year ago, requiring public companies to disclose material cybersecurity incidents under Item...more

Gray Reed

Three Data Privacy Lessons Learned from the Marriott Data Breach

Gray Reed on

Enforcement of data privacy laws across the US is in full force. Most recently, Marriott agreed to a $52 million settlement payment to 50 states, including $3.5 million to the State of Texas, following a data breach of 131...more

Health Care Compliance Association (HCCA)

Privacy Briefs: October 2024

23andMe agreed to pay $30 million and provide three years of security monitoring to settle a lawsuit accusing the genetics testing company of failing to protect the privacy of 6.9 million customers whose personal information...more

Baker Donelson

Data Breaches: The Not-So-Hidden Cost of Doing Business

Baker Donelson on

In this era of big data, smart devices, and constant connectivity, the clock's already ticking on your next data breach – it's just a matter of time. For companies of all sizes and across every industry, the stakes have never...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

Human Resources’ Role in Data Privacy and Cybersecurity, Part II: Assessing Five Key Areas of Risk

In today’s digital landscape, many organizations may face the unfortunate reality of a data breach. This second installment of a five-part series on employee data privacy will explore the key areas of risk that human...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #416 – Impersonation is the Most Prolific Phishing Tactic in 2024

A new report published by the software company Egress this month, Phishing Threat Trends Report, is a must-read. It outlines the proliferation of phishing toolkits on the dark web (that basically allows any Tom, Dick, and...more

Lowenstein Sandler LLP

Cyber Insurance for Operational Technology: Where Computers Touch the Real World

Lowenstein Sandler LLP on

On this episode of “Don’t Take No for An Answer,” Lynda A. Bennett, Chair of Lowenstein’s Insurance Recovery Group, speaks with David Anderson, Vice President of Cyber at Woodruff Sawyer, about the difference between...more

Bond Schoeneck & King PLLC

FTC Fines Hotel Company $52 Million for Delinquent Cybersecurity Practices

In a settlement with Marriott International and its subsidiary Starwood hotels and Resorts Worldwide, the FTC will require Marriott to implement a new comprehensive data security program. The settlement stems from a series of...more

Mayer Brown

Cyber Threats on the Rise: Dissecting the Common Themes Behind Recent Cybersecurity Incidents in Hong Kong

Mayer Brown on

Hong Kong has witnessed a notable surge in cyber breach incidents in recent years. The cyberattacks have affected various organisations across the public, private and non-profit sector. Cybersecurity incidents recorded a...more

Wiley Rein LLP

[Webinar] Best Practices in Cyber Preparedness - October 23rd, 12:00 pm - 1:00 pm EDT

Wiley Rein LLP on

We invite you to join us for an insightful webinar on Best Practices in Cyber Preparedness for Government Contractors and Critical Infrastructure Operators on Wednesday, October 23, 2024, from 12:00 p.m. – 1:00 p.m. EDT....more

Wyrick Robbins Yates & Ponton LLP

Maybe Not Practical After All: HUD Proposes Revised Cyber Incident Reporting Requirement for FHA-Approved Mortgagees

As we discussed in a recent post, earlier this year the U.S. Department of Housing and Urban Development (“HUD”) issued Mortgagee Letter 2024-10, which imposed a new requirement on all FHA-approved mortgagees to report...more

Osano

Data Privacy Buy-In: The Usual Suspects and What to Say to Them

Osano on

Getting the business to say “yes” to data privacy isn’t easy. Yet it remains one of the central tasks a data privacy professional must undertake. After all, you can’t protect consumers, protect your organization, and achieve...more

Troutman Pepper

Federal Cybersecurity Requirements Ought Not Be Ignored by Contractors

Troutman Pepper on

Since 2016, the federal government has implemented numerous procurement regulations and associated contract clauses to address cybersecurity by requiring contractors to adopt various controls and standards to protect...more

2,808 Results
 / 
View per page
Page: of 113

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide