News & Analysis as of

Data Breach Cyber Attacks Data Management

Troutman Pepper

Preserving Forensic Artifacts Following Incident Detection - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper on

‘Dear Mary,’ is Troutman Pepper’s Incidents + Investigations team’s advice column. Here, you will find Mary’s answers to questions about anything and everything cyber-related – data breaches, forensic investigations, how to...more

Association of Certified E-Discovery...

[Webinar] Mastering Information Governance: Strategies for Effective Data Management in the Evolving World of Cybersecurity - June...

Join us for an insightful webinar that will delve into the critical aspects of information governance and data management in the rapidly evolving field of cybersecurity. As organizations face escalating cyber threats, the...more

Pagefreezer

The 2024 ESI Risk Management & Litigation Readiness Report

Pagefreezer on

New study finds legal departments struggling to manage electronically stored information (ESI), resulting in delays and fines. Review the key findings from the 2024 ESI Risk Management & Litigation Readiness Report....more

Pillsbury - Propel

Privacy Breach: The Silent Killer of Startups

Pillsbury - Propel on

A privacy breach can have detrimental consequences for startups:  A privacy breach may trigger legal consequences and regulatory scrutiny, especially for a startup that operates in areas with stringent data protection laws...more

Robinson+Cole Data Privacy + Security Insider

The Risks of Excessive Data Retention and Tips for Information Security

In today’s digital age, our every action generates a trail of data. From online searches to credit card details, this data is collected by companies to enhance their services. However, the question arises – how long should...more

Robinson+Cole Data Privacy + Security Insider

10 Essential Strategies for Successful Information Governance and Data Retention for Executives

Information governance and data retention have been important topics in the corporate world for years. As an executive, it’s crucial to ensure effective management, storage, and secure disposal of your company’s data. Having...more

Health Care Compliance Association (HCCA)

BA Depicted by OCR as Example of Ransomware Dangers Recovered Quickly, Didn’t Expect Fine

Report on Patient Privacy 23, no. 11 (November, 2023) Tim DiBona clearly remembers Christmas Eve 2018 when the staff of his small firm—Doctors’ Management Service (DMS)—arrived at their West Bridgewater, Mass., office to...more

Health Care Compliance Association (HCCA)

Privacy Briefs: November 2023

Report on Patient Privacy 23, no. 11 (November, 2023) The American Hospital Association (AHA) is urging federal lawmakers to intervene with the HHS Office for Civil Rights (OCR) so that hospitals and health systems can...more

Health Care Compliance Association (HCCA)

Privacy Briefs: October 2023

Report on Patient Privacy 23, no. 10 (October, 2023) Kaiser Foundation Health Plan Inc. and Kaiser Foundation Hospitals will pay California $49 million to resolve allegations that they unlawfully disposed of hazardous waste,...more

J.S. Held

Critical Issues in Cyber Incident Response: What Happens After a Ransom Payment is Made

J.S. Held on

Ransomware trends – specifically related to frequency, cost, and payout – should no longer surprise us. We depend on technology more and more, integrating it into every aspect of our lives. As for data management, there is...more

Onna Technologies, Inc.

[Webinar] Declutter Your Data: Strategies for Efficient Data Retention & Risk Reduction - October 25th, 1:00 pm - 2:00 pm ET

In an era where data is often referred to as the “new oil,” an abundance of it can lead to unexpected challenges. Back in 2012, IDC estimated that information workers spent an average of 9.4 hours per week simply sifting...more

Stinson - Corporate & Securities Law Blog

SEC Adopts Rules on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies

The SEC adopted final rules requiring registrants to disclose material cybersecurity incidents they experience and to disclose on an annual basis material information regarding their cybersecurity risk management, strategy,...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - March 2023 #2

Robinson & Cole LLP on

CYBERSECURITY - Clop Claims Zero-Day Attacks Against 130 Organizations - Russia-linked ransomware gang Clop has claimed that it has attacked over 130 organizations since late January, using a zero-day vulnerability in...more

Tenace

Protecting Confidentiality: The Urgent Need for Strong Cybersecurity in Law Firms

Tenace on

Law firms are one of the most attractive targets for cybercriminals, making strong cybersecurity a critical concern for these organizations. With confidential client information, sensitive legal documents, and valuable...more

Polsinelli

Cyber Incident Reporting for Critical Infrastructure Act: Significant Changes to Incident Reporting Are on the Horizon

Polsinelli on

In May 2021, Colonial Pipeline, a privately held oil pipeline responsible for nearly half of the oil supply for the U.S. East Coast, was crippled by a DarkSide ransomware attack. DarkSide is widely believed to be a...more

Robinson+Cole Construction Law Zone

Cyber Insurance for the Construction Industry

Cyber-crime is an increasingly prominent threat to many industries, and construction is no exception. With the growing use of digital technologies in what was once a primarily “offline” industry, cyber-attacks can pose a...more

Nelson Mullins Riley & Scarborough LLP

When It Comes to Cybersecurity: Be Prepared!

As has been the trend for some time now, organizations across all industries and sectors are increasingly at risk of being targeted by bad actors online. Now, the adage espoused by IT security professionals is to prepare for...more

Bilzin Sumberg

Is Reporting Cyber Breaches to the Federal Government Required or Encouraged?

Bilzin Sumberg on

President Joe Biden signed the Strengthening American Cybersecurity Act into law on March 15.  Among other requirements, companies that are “covered entities” must report data breaches promptly to federal regulators.  For...more

Robinson+Cole Data Privacy + Security Insider

ECRI Names Cybersecurity Attacks as Top Health Technology Hazard for 2022

ECRI has been publishing its annual report of health technology hazards for the past 15 years. According to ECRI’s Device Evaluation group, “the Top 10 Health Technology Hazards list identifies the potential sources of danger...more

Burr & Forman

Data Breach Notification Laws in the United States: What is Required and How is that Determined?

Burr & Forman on

Has your business considered what obligations you would have to notify people in the event of a cyber-attack that compromises some or all of your IT systems? Have you cataloged all the data you collect and where it is stored...more

Wyrick Robbins Yates & Ponton LLP

Worried about Ransomware? Ten Steps to Help Legal Counsel Understand and Mitigate the Risk

Executive teams in the U.S. live in fear of a successful ransomware attack, and who can blame them? Attacks are both prevalent and evolving. Many attackers have shifted from encrypting data and locking up systems to also (or...more

Pullman & Comley, LLC

An Overview of Data Privacy and Protection Laws for Manufacturers

Pullman & Comley, LLC on

For many manufacturers, data privacy and protection laws may seem like legal concerns that apply to other, more consumer-facing companies.  While that may be largely true, given the ubiquitous nature of data, no business can...more

Robinson+Cole Data Privacy + Security Insider

Few Organizations are Actually Preparing for a Ransomware Attack

Although executives of organizations report that ransomware is their number one security concern, and 87 percent of them expect an increase in cyber-attacks against their organizations over the next year, only one-third of...more

Nossaman LLP

How to Prevent an OFAC Sanction When Responding to a Ransomware Attack

Nossaman LLP on

A ransomware attack is a major threat affecting all sectors of business, including healthcare. Organizations typically follow state and federal privacy laws as part of their ransomware prevention and response measures....more

Reveal

Why a Global Approach to InfoGov is Necessary with Today’s Emerging Markets

Reveal on

The Legal Technology industry tends to focus heavily on North America, and in many ways, it’s easy to see why. After all, technologies and workflows must align with the jurisdictions they are serving, which vary not only from...more

40 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide