All U.S states have laws about data security and what to do when there’s a data breach. Here is what’s in the Arizona law.
Who The Law Applies To. The law applies to anyone who conducts business in Arizona and who owns or...more
8/3/2018
/ Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Encryption ,
Hackers ,
Notification Requirements ,
Personally Identifiable Information ,
Privacy Laws ,
State Data Breach Notification Statutes
The California Consumer Privacy Act of 2018 (“CCPA”) offers a new, very broad framework for data protection with increased obligations for businesses, and its reach is far and wide. It was passed in a whirlwind seven days. On...more
7/5/2018
/ Consumer Information ,
Cure Periods ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Rights ,
Encryption ,
Governor Brown ,
Opt-Outs ,
Personally Identifiable Information ,
Portability ,
Private Right of Action ,
State Data Breach Notification Statutes ,
Statutory Damages
Snell & Wilmer’s Breach Response Team regularly guides clients through all phases of data breach and cyber incident response, including leading internal investigations related to data breaches and cyber incidents in...more
6/7/2018
/ Corporate Counsel ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Notification Requirements ,
Personally Identifiable Information ,
State Data Breach Notification Statutes ,
Young Lawyers
All U.S states now have laws about data security and what to do when there’s a data breach. Alabama recently was the 50th state to add such a law, and it takes effect on May 1, 2018. Here are its highlights....more
Business email compromise (“BEC”) is a type of cyberattack that is increasing at an alarming pace. The U.S. Federal Bureau of Investigation estimated in a May 2017 alert that global losses due to BEC scams totaled more than...more
11/2/2017
/ Business E-Mail Compromise (BEC) ,
CEOs ,
Cyber Attacks ,
Cybersecurity ,
Data Protection ,
Email ,
FBI ,
Fraudulent Wire Transfers ,
Hackers ,
Malware ,
Personally Identifiable Information ,
Policies and Procedures ,
Spam ,
Spoofing
Almost all U.S states have laws about data security and what to do when there’s a data breach. New Mexico recently added such a law for its state. Here is what’s in the New Mexico law....more
Colorado has adopted new rules that add cybersecurity requirements for certain entities with Colorado securities licenses. The rules are from the regulatory agency the Division of Securities. It licenses securities...more
8/9/2017
/ Broker-Dealer ,
Business Continuity Plans ,
Confidential Information ,
Cybersecurity ,
Cybersecurity Framework ,
Data Protection ,
Information Technology ,
Investment Adviser ,
New Rules ,
Risk Assessment ,
Risk Management ,
Security Breach
Colorado has new proposed rules that add cybersecurity requirements for certain entities with Colorado securities licenses. The proposed rules are from the regulatory agency the Division of Securities. It licenses securities...more
The New York Department of Financial Services has new cybersecurity regulations “designed to promote the protection of customer information as well as the information technology systems of regulated entities [financial...more
3/7/2017
/ Banking Sector ,
Chief Information Security Officer (CISO) ,
Confidential Information ,
Cybersecurity ,
Cybersecurity Framework ,
Data Protection ,
Financial Institutions ,
Financial Services Industry ,
Gramm-Leach-Blilely Act ,
Information Technology ,
Insurance Industry ,
Notice Requirements ,
NYDFS ,
Personally Identifiable Information ,
Risk Assessment ,
Risk Management
Almost all U.S states have laws about data security and what to do when there’s a data breach. Here is what’s in the Arizona law.
Who The Law Applies To. The law applies to anyone who conducts business in Arizona and...more
The “Internet of Things” is the universe of smart devices that talk to the internet or to one another. The devices have unique identifiers and the ability to automatically transfer data over a network on their own, without...more