News & Analysis as of

Data Protection Data Theft

Troutman Pepper

Understanding Access vs. Acquisition - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper on

Each of the 50 states has its own definition of what constitutes a reportable data breach. For some, it requires “unauthorized access” to personal information. For others, it requires “unauthorized acquisition.” And then,...more

Alston & Bird

Top 10 Issues General Counsel Need to Know About Ransomware in 2024

Alston & Bird on

Threat actors are evolving. Our Privacy, Cyber & Data Strategy Team explains how ransomware gangs have changed their tactics and how companies can respond to the threat while navigating new scrutiny from investors and...more

Seyfarth Shaw LLP

Cyber Strategy: HHS Weighs in on Cybersecurity in the Healthcare Industry

Seyfarth Shaw LLP on

Seyfarth Synopsis: The health care sector faces escalating cybersecurity risks given its size, technological dependence and the sensitive nature of data used therein. According to the U.S. Department of Health and Human...more

Foodman CPAs & Advisors

Data Theft Warning Signs From IRS

Foodman CPAs & Advisors on

IRS Awareness Campaign for the Summer 2023 focuses on data theft signs and the importance of staying alert against new and ongoing threats of tax-related identity in order to protect the taxpayer and the tax professional. ...more

Baker Donelson

MOVEit Transfer Zero-Day Vulnerability: What Companies Need to Know

Baker Donelson on

On May 31, 2023, renowned managed file transfer solution provider Ipswitch, Inc. revealed a zero-day vulnerability in its flagship solution, MOVEit Transfer, that can enable mass data theft from thousands of organizations....more

Kelley Drye & Warren LLP

[Webinar] 2022 WORKing Lunch Series: Protecting Your (Human) Resources: Fighting Business Email Compromise and Ransomware -...

HR employees are, willingly or not, the guardians of the company’s most sensitive collection of data—its employee’s personal information. Cybercriminals often perceive the human resources department as the perfect gateway...more

Ankura

The Metaverse – What Does It Mean for Data Privacy and Information Security?

Ankura on

What are the implications for data privacy and information security in the Metaverse? The metaverse will create an “even more immersive and embodied Internet”, where users can meet friends, collaborate with colleagues, play...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - January 2022 #3

Robinson & Cole LLP on

CYBERSECURITY - ECRI Names Cybersecurity Attacks as Top Health Technology Hazard for 2022 - ECRI has been publishing its annual report of health technology hazards for the past 15 years. According to ECRI’s Device...more

Hinshaw & Culbertson LLP

Practical Tips to Mitigate the Risk of Being Hacked by Fake IRS or Google Voice Scams

Risk Management Question - What are some of the newest hacking scams that may affect law firms and other businesses? The Issue - On October 27, 2021, the Federal Trade Commission (FTC) issued warnings to be on alert...more

Reveal

Hackers Will Not Only Take Your Money, They Could Also Take Your Patients’ Lives

Reveal on

Go to just about any news site today and there is probably a new story about a data breach that costs a company millions of dollars. Just in the past few weeks, we’ve seen Colonial Pipeline pay as much as $5 million in...more

Fisher Phillips

New Federal Tools Can Help Private Sector Protect Trade Secrets From Cyberattacks – And May Soon Require Reporting

Fisher Phillips on

Cybersecurity was undoubtably on the forefront of the agenda for many organizations in 2020 – and 2021 should be no different. The rapid shift to remote work over the past year has led to an increased number of cybersecurity...more

International Lawyers Network

Protecting Confidential Information in Canada: Is there a Better Way?

The British Columbia decision Equustek Solutions Inc. v Jack highlights the difficult, time consuming, and expensive exercise that organizations may find themselves in when an employee misuses confidential information. In...more

Health Care Compliance Association (HCCA)

Security Threats Soar From Nation-State Bad Actors as the New Year Gets Underway

Report on Patient Privacy 18, no. 1 (January 2021) - Security threats to health care entities will continue to escalate in 2021, as bad actors with significant capabilities target pandemic-weary organizations still...more

Fisher Phillips

Cybercriminals Target Healthcare Industry During The Pandemic

Fisher Phillips on

Several federal agencies have teamed up to warn healthcare employers of the increased threat they face as a result of malicious cybercriminals aiming to take advantage of the pandemic to wreak havoc on their operations. The...more

Health Care Compliance Association (HCCA)

Report on Patient Privacy Volume 20, Number 11. Privacy Briefs: November 2020

Report on Patient Privacy 20, no. 11 (November 2020) - HHS Office of the National Coordinator (ONC) for Health Information Technology (ONC) is giving health care organizations more time to meet new rules on information...more

NAVEX

5 Ways National Cybersecurity Month Is Like Halloween

NAVEX on

October is best known for Halloween, but October also happens to be National Cybersecurity Awareness Month. It’s a time to focus on how cybersecurity is a shared responsibility, and we all must work together to protect and...more

Shumaker, Loop & Kendrick, LLP

Client Alert: The OCR Gives Practices 1.5 Million Reasons to Prioritize HIPAA Compliance

Today the Office of Civil Rights (OCR) at the U.S. Department of Health and Human Resources announced that a Georgia orthopedic clinic agreed to pay $1.5 million and adopt a two-year corrective action plan to settle potential...more

Association of Certified E-Discovery...

Departing Employees, Data Theft, and Digital Forensics

In late 2019, it was reported by Infosecurity Magazine that 72% of former employees admitted taking company data with them upon departure. Determining what actions a former employee took on a company device leading up to...more

BCLP

Countdown to the CCPA: What is legally considered a “Data Breach”?

BCLP on

When the California Consumer Privacy Act (“CCPA”) takes effect in January 2020, California will become the first state to permit residents whose personal information is exposed in a data breach to seek statutory damages of...more

Faegre Drinker Biddle & Reath LLP

Newly-Discovered Vulnerability Highlights the Security Concerns Surrounding Bluetooth Technology

A recent report by researchers at the Helmholz Center for Information Security (CISPA), Singapore University of Technology and Design, and the University of Oxford has revealed that Bluetooth technology is vulnerable to a new...more

Snell & Wilmer

Taxpayer Cybersecurity – Step 5: Create a Data Theft Recovery Plan

Snell & Wilmer on

The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to...more

Snell & Wilmer

Taxpayer Cybersecurity – Step 3: Avoid E-mail Phishing Scams

Snell & Wilmer on

The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #198: Cybersecurity for Tax Professionals

This week, I was honored to again have the opportunity to participate as a speaker at the Internal Revenue Service’s Nationwide Tax Forum 2019 in Washington, D.C. Through a generous grant provided by the American Coalition...more

Blank Rome LLP

Data Security Tips for Human Resources Professionals

Blank Rome LLP on

The task of securing company networks and systems is no longer delegated solely to an organization’s IT department. Human resources plays an equally important role in protecting company data. The authors of this article...more

Buckingham, Doolittle & Burroughs, LLC

Stolen Trade Secrets – Here’s why companies are losing in court

Over the past decade, companies are increasingly losing trade secret theft cases. Even when corporate secrets are stolen, courts are dismissing claims of disputed trade secret cases because plaintiffs have not taken...more

53 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide