News & Analysis as of

Data Protection Employee Training Policies and Procedures

Fisher Phillips

Insider Threats to Healthcare Data: What You Need to Know and 5 Steps You Can Take Now

Fisher Phillips on

Healthcare data breaches are occurring more frequently and on larger scales than ever before – and while you defend against cyberattacks and other external threats, make sure you do not overlook the critical role your...more

Dunlap Bennett & Ludwig PLLC

The Role Of A Cybersecurity Law Firm In Safeguarding Digital Assets

In today’s digital landscape, organizations face numerous cybersecurity threats that can compromise their valuable digital assets, including their data, IT infrastructure, networks, software, and intellectual property (IP)....more

Reveal

6 Steps to Implementing an Effective Corporate Compliance Strategy

Reveal on

It’s no secret that compliance is a huge part of a corporate lawyer’s job. Whether it’s internal or external compliance, there’s a lot that needs to be done to keep a business operating smoothly and on the right side of the...more

Sheppard Mullin Richter & Hampton LLP

Companies Have Until March to Comment on EDPB Data Breach Notification Guidelines

Many supervisory authorities across Europe have reported increasing numbers of data breach notifications since the introduction of GDPR. While most companies are now familiar with the 72-hour reporting obligation for...more

NAVEX

4 Ways to Protect ePHI Beyond HIPAA Compliance

NAVEX on

Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more

Bracewell LLP

SEC Examiners Release Cyber Observations: What You Need To Know

Bracewell LLP on

On January 27, 2020, the SEC’s Office of Compliance Inspections and Examinations (OCIE) announced its most recent Cybersecurity and Resiliency Observations. This report highlights specific practices that have been, and can be...more

Health Care Compliance Association (HCCA)

[Event] Regional Compliance & Ethics Conference - February 27th - 28th, Anchorage, AK

Our Regional Compliance Conferences provide attendees with a forum to interact with local compliance professionals, share information about your compliance successes and challenges, and create educational opportunities for...more

Robinson+Cole Data Privacy + Security Insider

Cottage Health Settles with OCR for $3M

We previously reported that Cottage Health, a health care entity operating several hospitals in California, settled with the State of California for $2 million for a security incident that occurred in 2013. On February 7,...more

Akin Gump Strauss Hauer & Feld LLP

NFA Issues Interpretive Notices for CPOs Regarding Internal Controls Systems and Cybersecurity

• The NFA has determined that registered CPOs must implement an internal controls system and highlighted best practices for such a framework. • In response to certain frequently asked questions, the NFA has also updated its...more

K&L Gates LLP

Digital Crisis PR: Top five digital precautions for universities

K&L Gates LLP on

When it comes to digital threats, universities must protect not only a broad and deeply layered infrastructure, but also vast populations of students. In this episode, Elisa D’Amico and Desiree Moore outline their top five...more

Skadden, Arps, Slate, Meagher & Flom LLP

OCIE Releases Results of Cybersecurity Examination Initiative

On August 7, 2017, the Office of Compliance Inspections and Examinations (OCIE) of the U.S. Securities and Exchange Commission (SEC) released a summary of its observations (the report) from cybersecurity examinations of 75...more

Seyfarth Shaw LLP

Technically Speaking, Cybersecurity Isn’t About Speaking Technically

Seyfarth Shaw LLP on

These days cybersecurity seems to be all about technology. Pen testing, firewalls, port scanning, SIEM, zero-day, IPS, AES256, SHA, DMZ, NIDS, TLS, SS7 – I’ll stop. I could go on, but you get the idea. And I have a vested...more

Morrison & Foerster LLP - Social Media

Socially Aware: The Social Media Law Update Volume 6, Issue 4

Five social media law issues to discuss with your clients - The explosive growth of social media has clients facing legal questions that didn’t even exist a few short years ago. Helping your clients navigate this...more

Pullman & Comley - Labor, Employment and...

You Can’t Just WISPer – Employers Must Publish or Display Security Policies

WISP is the acronym for Written Information Security Policy. The information at issue is an individual’s personal information and identifiers, such as a Social Security number, driver’s license number, credit or debit card...more

Ervin Cohen & Jessup LLP

The Top 10 Priorities For Your Information Governance Program

The title, of course, begs the question: does your business even have an Information Governance Program? If not, you should get one—quick. An integrated Information Governance Program is considered a “best practice” to...more

15 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide