While most state data breach notification statutes contain similar components, there are important differences, meaning a one-size-fits-all approach to notification will not suffice. What’s more, as data breaches continue to...more
Businesses have been scrambling since Friday evening when news spread that a ransomware attack named WannaCry is compromising organizations at an alarming rate. In less than 48 hours, it has compromised more than 130,000...more
As a life sciences or medical device company, it is mission critical to protect lab books, drug and clinical test data, product formulas and production processes that underlie your patents, trade secrets and know-how from...more
4/4/2017
/ Biotechnology ,
Confidential Information ,
Corporate Officers ,
Cybersecurity ,
Data Breach Plans ,
Federal Trade Commission (FTC) ,
Food and Drug Administration (FDA) ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Incident Response Plans ,
Intellectual Property Protection ,
Life Sciences ,
Medical Devices ,
Non-Disclosure Agreement ,
Pharmaceutical Industry ,
Policies and Procedures ,
Popular ,
Trade Secrets
The New York State Department of Financial Services (DFS) made headlines back in late September with a “first-in-the-nation” piece of legislation aimed at mandating specific cybersecurity protocols for banks, insurance...more
12/3/2016
/ Banks ,
Board of Directors ,
Brokers ,
Chief Information Security Officer (CISO) ,
Covered Entities ,
Credit Unions ,
Cybersecurity ,
Data Protection ,
Department of Financial Services ,
Financial Institutions ,
Incident Response Plans ,
Insurance Industry ,
Mortgage Lenders
On October 6, 2015, California Governor Jerry Brown signed into law several changes to California’s Data Breach Notification Statute. The law, as amended, adds additional categories of information into the definition of...more
10/12/2015
/ Breach Notification Rule ,
Consent ,
Cyber Incident Reporting ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Encryption ,
Governor Brown ,
New Legislation ,
Personal Data ,
Personally Identifiable Information ,
Popular ,
Third-Party ,
Websites
Not coincidentally, on July 21, 2015, Wired Magazine published an article with groundbreaking evidence of hacking a car wirelessly, and Senators Edward Markey (D-Mass.) and Richard Blumenthal (D-Conn.) introduced legislation...more
7/24/2015
/ Automotive Industry ,
Cloud Computing ,
Cyber Attacks ,
Cybersecurity ,
Dashboard ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Retention ,
Data Security ,
Federal Trade Commission (FTC) ,
Hackers ,
Internet of Things ,
NHTSA ,
Personally Identifiable Information ,
Proposed Legislation ,
Safety Standards ,
Transparency ,
Wireless Technology
Trying to understand how a hacker thinks can twist your brain around – while you normally think about how to make something work or why something is not working, hackers think how to get something to work in ways that it is...more
It may surprise many who have observed the recent media attention of data breaches to learn that in the world of Cybersecurity, sometimes it’s the oldest attacks that find new life when they are applied in new ways. Phishing...more
Door locks, cameras, fitness bracelets, home security, thermostats, refrigerators, utility meters, light bulbs, and cars. The list of the things and devices that can collect information about you and send it into the big...more
“If we’re going to be connected, we’ve got to be protected.” With those words President Barack Obama unveiled new consumer privacy legislation and new cybersecurity and privacy partnerships between the federal government and...more
On June 20, 2014 Governor Rick Scott approved the Florida Information Protection Act of 2014, overhauling the requirements and steps companies must follow when faced with a potential or actual security breach resulting in the...more