Tags » Breach Notification

Insider Misuse of Computers: No Big Deal? It Can Be a Data Breach, Ask Boeing

Insider misuse triggers a breach just like outside hackers.

When a company’s information is compromised because of insider[1] misuse of computers or information, regardless of insider’s intentions, the result for the company and the data subjects of that information is often the same as if it were an attack by an outside adversary – it is a data breach. 1,436 more words

Cybersecurity Law

You'll Pay for a Delay

The Office for Civil Rights did not wait long into 2017 to issue its first settlement for a HIPAA related breach. The honor for Presence Health… 366 more words


FTC Releases Data Breach Response: A Guide for Business

The Federal Trade Commission has released a short guide for businesses on steps to take once a breach has occurred.

The guide is below.  For advice on implementing a plan to protect consumers’ personal information, to prevent breaches and unauthorized access, check out the FTC’s… 20 more words

Cyber (Data) Security

Yahoo Data Breach: US Senators Demand Answers - Still Think You Don't Have to Disclose and Notify?

There is a grave and unfortunate misperception among many business leaders who believe that when their company has had a data breach, going through a response and notification of affected individuals is optional. 365 more words

Computer Fraud And Abuse Act

Cybersecurity Incident Response Checklist

Business leaders, when people like me tell you that having a cybersecurity incident in your company is like being in a building on fire, we are not exaggerating. 178 more words

Cybersecurity Law

FTC Finds Substantial Injury in LabMD Data Breach

Since 2002, the FTC has brought over 50 data security enforcement actions under Section 5 of the FTC Act.  Most companies quickly enter consent decrees with only two companies making the choice to fight the FTC. 373 more words

Cyber (Data) Security

Cybersecurity: How Long Should An Incident Response Plan Be?

Last evening I had the pleasure of talking cybersecurity law with a group of CIOs from some pretty sophisticated companies. It was a great discussion and I learned as much as I shared — just the way I like it. 636 more words

Cybersecurity Law