DLA Piper Law Alert: Executive Branch Acts on Cybersecurity – What You Need To Know About This Groundbreaking Effort

By Jim Halpert, Sydney M. White and Ryan T. Sulkin | Today, the White House released the National Institute of Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity [i] , which is a key step in the implementation of Executive Order 13636 on cybersecurity issued by...

Peter S. Vogel: 2014 Cybersecurity Threats to Money & Data

By Peter S. Vogel “Cybercriminal gangs of the 21st century will target cloud-based applications and data repositories because that’s where the data is” as predicted in McAfee® Labs’ 2014 Threat Predictions . Cloud cyber vulnerability was stressed by McAfee: This could...

Cyber(in)security: The Perils of Preserving Customer Data

“Be Prepared” is one of the world’s most enduring mottos. It has been used, with international and organizational variations, by millions of Boy Scouts—and later Girl Guides and Girl Scouts—for over a century . But like another famous motivational maxim—Nike’s...

William A. Ruskin: Best Practices For Avoiding Data Breach Liability

By William A. Ruskin Articles concerning cyber-security and data breach typically fall into two general categories: those discussing how to prevent a data breach from occurring and those discussing how to respond when one occurs. As I discussed in my earlier blog post , smart players in the healthcare...

Vandeventer Black LLP: P:rimer On Virginia’s Data Breach Law: Part 1

By Christopher S. Colby Imagine that your laptop is stolen. Since you conduct all your business on it, you struggle to remember the last time you backed up your data, and agonize at the prospect of rebuilding weeks, months, and possibly years of files. As you contemplate the recovery of your business...

Vandeventer Black LLP: P:rimer On Virginia’s Data Breach Law: Part 2

By Christopher S. Colby Recall from Part I of the Primer on Virginia's Data Breach Law that your laptop has been stolen, and you have concluded there has been a breach of security under Virginia's data breach law. You must now determine whom to notify, and this will depend on your relationship...

DLA Piper Cybersecurity Law Alert: Hackers Steal 1.2 Billion Passwords – 4 Steps To Take Now

By Aravind Swaminathan and Tara McGraw Swaminatha | The New York Times reported this week that an organized Russian criminal group stole approximately 1.2 billion user name and password credentials associated with more than 500 million email addresses from hundreds of thousands of websites around...

Ballard Spahr LLP: Massive Hacking Operation Further Reveals Weakness Of Passwords

By the Privacy and Data Security Group A small private cybersecurity firm recently revealed that a Russian computer hacking organization amassed more than 1.2 billion username and password combinations. The data was collected across a wide swath of websites, from both large companies and small independent...

Peter S. Vogel: Cybercrime is Growth Industry Estimated to be as Much as $575 Billion

By Peter S. Vogel A recent report estimates that the ”cost of cybercrime includes the effect of hundreds of millions of people having their personal information stolen—incidents in the last year include more than 40 million people in the US, 54 million in Turkey, 20 million in Korea, 16...

Peter S. Vogel: Judge Allows Libel Suit Based on Google Autocomplete Search Results

By Peter S. Vogel A Hong Kong Judge disagreed with Google that Google’s Autocomplete may have created libeleous content and “cited Europe’s recent ‘right to be forgotten’ ruling requiring Google to remove embarrassing or outdated search results upon request” as...

Peter S. Vogel: Cybercrime is Getting Worse – 5 Reasons

By Peter S. Vogel On the heels of the recent report that cybercrime is a $575 billion growth industry , Infoworld pointed out “that amount of crime has persisted for a long time, well before the Internet.” The article included these 5 reasons why cybercrime is worse than ever : 1. Internet...

Norton Rose Fulbright: Congress on Cybersecurity: Recent Bill Limits Liability

By Gerard G. Pecht , Peter A. Stokes , Mark Thomas Oakes , Utsav Mathur and Geraldine W. Young In the days leading up to its August 2014 recess, the U.S. House of Representatives passed a number of bills aimed at strengthening cybersecurity. Those measures include H.R. 3696—known as the National...