Search Results (2442)
Documents on computer data services
Show: results per page
|Cybercrime on the Rise: Targeting Banking Institutions and Insurance Companies|
James L. Ansorge, Jonathan L. Bing, Melissa K. Ventrone; Wilson Elser Moskowitz Edelman & Dicker LLP;
May 28, 2015, previously published on May 26, 2015Security experts are warning that 2015 is the “Year of the Healthcare Hack” as media outlets continue to report on a number of high-profile companies that have recently experienced attacks by cybercriminals seeking valuable personal information. Anthem Inc., the second-largest U.S....
|Connecticut Supreme Court Affirms No Coverage for Lost Tapes Absent Publication of Data|
Joseph F. Bermudez, Suzanne M. Meintzer; Wilson Elser Moskowitz Edelman & Dicker LLP;
May 28, 2015, previously published on May 19, 2015In Recall Total Information Mgmt., Inc. v. Federal Ins. Co., SC19201 (Conn. May 18, 2015), the Connecticut Supreme Court held that where there was no factual support that anyone ever actually accessed private information stored on lost data tapes, the policyholder’s assignee could not...
|Shaping Up - Update on the EU’s Draft General Data Protection Regulation|
Mintz Levin Cohn Ferris Glovsky Popeo P.C.;
May 21, 2015, previously published on May 4, 2015On this Privacy Monday, we can definitely say that the long winter of our discontent (at least for some of our readers) is over. Happy spring!
|NAIC Adopts Cybersecurity Regulatory Principles - What’s Important to the Regulators|
Mintz Levin Cohn Ferris Glovsky Popeo P.C.;
May 21, 2015, previously published on May 1, 2015The National Association of Insurance Commissioners (NAIC), the standard-setting organization in the U.S. insurance industry created and governed by the chief insurance regulators from the 50 states, the District of Columbia, and five U.S. territories, recently published its “Principles for...
|Spring: A Time for Change in UK Employment and Data Protection Law|
Pia Padfield; Ogletree, Deakins, Nash, Smoak & Stewart, P.C.;
May 1, 2015, previously published on April 7, 2015Spring is always a time for new beginnings: the end of the financial year and the start of a new one, government election season, and time to advance clocks forward for daylight saving time. In the United Kingdom, spring also heralds new changes in employment and data protection laws. Below are...
|Data monetization: CPO’s new big challenge|
Chantal Bernier; Dentons Canada LLP;
April 15, 2015, previously published on January 29, 2015 What I would like to do today is facilitate a discussion among us rather than simply present. Why? Because the issue of data monetization and its privacy implications is still unfolding. So I believe it is more useful at this point for us to think about it together, than to individually propose...
|President Obama’s New Data Privacy Agenda|
James J. Giszczak, Sara H. Jodka, Dominic A. Paluzzi; McDonald Hopkins LLC;
April 15, 2015, previously published on January 14, 2015President Obama recently spoke to the Federal Trade Commission about his privacy and data security agenda. The agenda included a series of voluntary partnerships, but the cornerstone was two privacy acts that will soon be sent to Congress: The Personal Data Notification and Protection Act and the...
|Cyber Insurance: Do I Really Need It?|
William C. Wagner; Taft Stettinius & Hollister LLP;
April 1, 2015, previously published on March 23, 2015*This is the first post in a five-part series on cyber insurance, culminating in a webinar entitled “Insurance Coverage for Privacy and Data Breaches: Hot Topics and Critical Issues” on Wednesday, April 22, 2015, at 12:00-1:00 p.m. Eastern.
|Checklists Not Enough When Developing a WISP, FTC Director Comments at IAPP Global Privacy Summit|
Joseph J. Lazzarotti; Jackson Lewis P.C.;
March 31, 2015, previously published on March 9, 2015This year’s IAPP Global Privacy Summit was very informative on a number of fronts, including the helpful insight provided by officials at the Federal Trade Commission (FTC) on a range of topics. A good summary of some of their comments, which includes concerns they expressed about the...
|Employers Beware: Medical Identity Theft on the Rise and is the Golden Target for Hackers|
Lillian Chaves Moon; Jackson Lewis P.C.;
March 31, 2015, previously published on December 5, 2014As we’ve discussed previously, medical identity information is worth more than ten (10) times that of financial information on the black market. This gives hackers a financial incentive to obtain such information that is maintained not only by medical providers and pharmacies but also by...