News & Analysis as of

Breach Notification Rule Cyber Insurance Risk Management

Fox Rothschild LLP

Navigating the CDK Global Ransomware Attack: Practical Guidance for Auto Dealerships

Fox Rothschild LLP on

CDK Global, a key provider of cloud-based software for auto dealerships, suffered a severe ransomware attack this week, disrupting operations for thousands of dealerships across North America. The attack has crippled vital...more

Bradley Arant Boult Cummings LLP

One Phrase, Multiple Interpretations – How Your Scope of Cyber Coverage Can Vary Depending on Your Jurisdiction

This is a deceptively simple question — risk managers rightfully expect to know the scope of their coverages when they build their insurance programs. Unfortunately, judicial interpretation of common policy terms can turn...more

Morrison & Foerster LLP

Litigation Readiness: Seven Things to Keep in Mind

Morrison & Foerster LLP on

Data breach class actions continue to rise, following almost inevitably from nearly every major security incident. Here are seven things in-house counsel can do to prepare for that anticipated litigation....more

Jackson Lewis P.C.

Importance of Protecting Employee Information as Privacy and Cybersecurity Laws Proliferate

Jackson Lewis P.C. on

Most human resources professionals are concerned about the privacy and security of the vast amounts of personal information they manage. This article discusses steps to consider taking against the challenges. Deluge of...more

Bennett Jones LLP

Cybersecurity: 2017 Report & 2016 Reflections - What Businesses and Boards Need to Know

Bennett Jones LLP on

In 2016, cybersecurity continued to grow as a primary business risk for companies worldwide. Data breaches continued to escalate both in number and magnitude and the landscape of legal and regulatory liability evolved and...more

Foley & Lardner LLP

Cybersecurity Update - July 2015

Foley & Lardner LLP on

Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more

6 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide