Tags » Breach Notification

National data breach notification law pros and cons? What do you think?

What are the pros and cons of a national breach notification law?

That is the topic of a discussion among Chief Information Security Officers that I will be moderating for the… 211 more words

Data Breach

Insider Misuse of Computers: No Big Deal? It Can Be a Data Breach, Ask Boeing

Insider misuse triggers a breach just like outside hackers.

When a company’s information is compromised because of insider[1] misuse of computers or information, regardless of insider’s intentions, the result for the company and the data subjects of that information is often the same as if it were an attack by an outside adversary – it is a data breach. 1,436 more words

Cybersecurity Law

You'll Pay for a Delay

The Office for Civil Rights did not wait long into 2017 to issue its first settlement for a HIPAA related breach. The honor for Presence Health… 366 more words


FTC Releases Data Breach Response: A Guide for Business

The Federal Trade Commission has released a short guide for businesses on steps to take once a breach has occurred.

The guide is below.  For advice on implementing a plan to protect consumers’ personal information, to prevent breaches and unauthorized access, check out the FTC’s… 20 more words

Cyber (Data) Security

Yahoo Data Breach: US Senators Demand Answers - Still Think You Don't Have to Disclose and Notify?

There is a grave and unfortunate misperception among many business leaders who believe that when their company has had a data breach, going through a response and notification of affected individuals is optional. 365 more words

Computer Fraud And Abuse Act

Cybersecurity Incident Response Checklist

Business leaders, when people like me tell you that having a cybersecurity incident in your company is like being in a building on fire, we are not exaggerating. 178 more words

Cybersecurity Law

FTC Finds Substantial Injury in LabMD Data Breach

Since 2002, the FTC has brought over 50 data security enforcement actions under Section 5 of the FTC Act.  Most companies quickly enter consent decrees with only two companies making the choice to fight the FTC. 373 more words

Cyber (Data) Security