On March 15, 2023, the United States Securities and Exchange Commission (SEC) took a major step towards strengthening cybersecurity in the financial sector by proposing three new rules. These rules aim to improve privacy,...more
Earlier this year, a massive Twitter data breach occurred. Researchers are learning that the data breach was significantly more severe than initially reported.
In the first reports, one hacker was suspected of exploiting a...more
Takeaway: Security labels on internet-connected devices are on the horizon for companies that manufacture and want to sell such devices worldwide.
On October 19, 2022, 50 representatives from different industries including...more
Takeaway: In many data breach cases, a cybersecurity expert may evaluate whether the company’s security measures were reasonable and appropriate or, alternatively, if the company lacked the requisite technology to detect a...more
9/15/2022
/ COOs ,
Cybersecurity ,
Data Breach ,
Expert Testimony ,
FBI ,
Gross Negligence ,
Information Technology ,
Popular ,
Reliability Standards ,
Risk Assessment ,
Willful Misconduct
On July 7, 2022, Governor Wolf approved House Bill 2412, which authorizes the governor additional powers under Title 51 to order the Pennsylvania National Guard to support State and Local government entities with...more
Takeaway: With ransomware attacks increasing over the past few years, healthcare organizations can expect hackers to make ransom demands while holding their computer systems hostage....more
Takeaway: To ensure investor safety and emphasize a commitment to user privacy, corporate executives and similarly-situated high ranking officers must not provide any statements or omissions that affirmatively create a...more
6/28/2022
/ Corporate Counsel ,
Cybersecurity ,
Data Breach ,
Data Harvesting ,
Deceptive Intent ,
Facebook ,
Google ,
Liability ,
Misleading Statements ,
Omissions ,
Popular ,
Rule 10(b) ,
Rule 10b-5 ,
SCOTUS ,
Securities Exchange Act ,
Securities Fraud
Takeaway: The DOJ’s recent revisions to their internal policy promote the Department’s goals that the CFAA is applied consistently by government attorneys and better understood by the public. These goals ensure that the law...more
Takeaway: While the current patchwork of state consumer privacy laws is complex, there are consumer rights and business obligations that are common to all of the laws. An awareness of these key concepts will help make it...more
Takeaway: The new Better Cybercrime Metrics Act will help the federal government track, measure, analyze, and prosecute cybercrime....more
Takeaways: Uncertainties over threats of cyberattacks resulted in both the House and Senate passing CIRCIA, which created an opportunity for whistleblowers to come forward under the False Claims Act with...more
Takeaway: With the surge of data and cybersecurity breaches, corporate directors and officers have become targets for shareholder derivative lawsuits. Fortunately, there are procedural measures that directors and officers can...more
Companies and consumers alike are under perpetual assault from bad actors as IoT, work from home, and cloud migration – all intended to improve productivity – have expanded the cyber attack surface. The continually evolving...more
10/15/2021
/ Best Practices ,
Continuing Legal Education ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Breach Plans ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Retention ,
Data Security ,
Data Use Policies ,
Enforcement ,
Internal Controls ,
Personal Information ,
Popular ,
Privacy Laws ,
State Data Breach Notification Statutes ,
State Privacy Laws ,
Supply Chain ,
Webinars