• Vinayak Kohli
    Vinayak Kohli
    • over 8 years ago
    • Practical Guidance Journal
    • pa

    Cybersecurity and Data Protection: Helping Healthcare Clients Protect Patient Information

    By: Kimbely Metzger , Ice Miller. Medical identity theft, and incomplete patient disclosure due to cybersecurity concerns, can be dangerous—even deadly—to individuals and can compromise community wellness. Breaches of health information...
  • Sherica Celine
    Sherica Celine
    • over 3 years ago
    • Practical Guidance Journal
    • pa

    Current Awareness: Net Neutrality—Tweeting Corporate Information—SEC Cybersecurity Enforcement

    AMENDMENTS TO NEWLY PASSED CALIFORNIA CONSUMER PRIVACY ACT SIGNED INTO LAW By: Lexis Practice Advisor Attorney Team GOVERNOR EDMUND G. BROWN SIGNED A BILL AMENDING the California Consumer Privacy Act (CCPA) just weeks after its hasty enactment in...
  • Vinayak Kohli
    Vinayak Kohli
    • over 6 years ago
    • Practical Guidance Journal
    • pa

    Ransomware Planning and Response Best Practices

    By: Nolan Goldberg and Anisha Shenai-Khatkhate , Proskauer Rose LLP Ransomware attacks have become a prevalent cybersecurity threat. These attacks pose significant legal and financial risks to both individuals and organizations. This article addresses...
  • Vinayak Kohli
    Vinayak Kohli
    • over 6 years ago
    • Practical Guidance Journal
    • pa

    The GDPR Compliance Deadline Has Arrived—Are You Prepared?

    By: Nicholas R. Merker, Ice Miller LLP The deadline for organizations to comply with the European Union (EU) General Data Protection Regulation (GDPR) is upon us. 1 As of May 25, 2018, all entities covered under the GDPR must be able to demonstrate...
  • Vinayak Kohli
    Vinayak Kohli
    • over 5 years ago
    • Practical Guidance Journal
    • pa

    Cybersecurity Starts at the Top: Risks and Concerns for Directors and Officers

    By: Matthew D. Dunn and Melissa J. Erwin , Carter Ledyard & Milburn LLP While many are no doubt tired of hearing about cybersecurity, hackers and cyber-criminals continue to employ sophisticated and evolving strategies to access data and disrupt...
<>