Tags » Breach Notification

Yahoo Data Breach: US Senators Demand Answers - Still Think You Don't Have to Disclose and Notify?

There is a grave and unfortunate misperception among many business leaders who believe that when their company has had a data breach, going through a response and notification of affected individuals is optional. 365 more words

Computer Fraud And Abuse Act

Cybersecurity Incident Response Checklist

Business leaders, when people like me tell you that having a cybersecurity incident in your company is like being in a building on fire, we are not exaggerating. 178 more words

Data Breach

FTC Finds Substantial Injury in LabMD Data Breach

Since 2002, the FTC has brought over 50 data security enforcement actions under Section 5 of the FTC Act.  Most companies quickly enter consent decrees with only two companies making the choice to fight the FTC. 373 more words

Cyber (Data) Security

Cybersecurity: How Long Should An Incident Response Plan Be?

Last evening I had the pleasure of talking cybersecurity law with a group of CIOs from some pretty sophisticated companies. It was a great discussion and I learned as much as I shared — just the way I like it. 636 more words

Data Breach

The Saskatchewan OIPC okays health authority's incident response

On June 8th, the Office of the Saskatchewan Information and Privacy Commissioner issued an investigation report in which it held that a regional health authority responded appropriately to a privacy breach. 120 more words

Privacy (Not Workplace)

The Difficulties with Breach Notification Timelines

From the 2015 PLUS Conference session “Handling Cross-Border Data Breaches,” Theodore Kobus III, Esq. (BakerHostetler), Paul Nikhinson (Beazley), and Catherine Mulligan (Zurich North America) discuss the different time frames for breach notification between states in the U.S., and between the U.S., Europe and Brazil. 69 more words

International Conference

Why Cybersecurity Incidents Are Legal Events

In this video, cybersecurity and data protection attorney Shawn Tuma explains why cybersecurity incidents are as much legal events as they are information technology and business / public relations events. 60 more words

Data Breach