Category Archives: Cybersecurity

Subscribe to Cybersecurity RSS Feed

Court Rules Drivers Lack Standing to Pursue Claims Against Uber Because Data Breach Did Not Include Drivers’ Social Security Numbers

Uber
California companies housing their drivers’ personal information may feel less exposed to liability in light of the Northern District of California’s holding in Antman v. Uber Technologies, Inc. in May.[1] The trial court in Antman found that Uber was not liable to its drivers after hackers illicitly accessed their personal information through Uber’s computer system.[2] … Continue reading this entry

Integrating Information Security Into the Technology Development Process

GDPR
In a recent blog post, I discussed limitation of liability clauses in technology contracts. Given the favorable response to that post, I thought it would be of interest to discuss another misunderstood and frequently neglected area of technology contracting: information security warranties. Let me be more specific. Most well-drafted technology agreements contain specific warranties and … Continue reading this entry

California Moves Towards GDPR-like Privacy Protections in the California Consumer Privacy Act of 2018

CCPA At-A-Glance The new law gives consumers broad rights to access and control of their personal information and imposes technical, notice, and financial obligations on affected businesses. CCPA was enacted to protect the privacy of California consumers and has some similar characteristics to the EU’s General Data Protection Regulation (GDPR), including a new and very … Continue reading this entry

Cryptocurrency Industry Insiders Eager for Regulatory Clarity, Foley Survey Finds

Cryptocurrency
A decade into the cryptocurrency revolution, the digital currency’s future is awash with questions from regulation and enforcement to exactly what type of asset they are to the impact of volatility in market values.… Continue reading this entry

GDPR and U.S. eDiscovery - Who Will Win the Game of Chicken

GDPR
Well, it has now happened. The European Union’s new General Data Protection Regulation (GDPR) went into effect on May 25, 2018. In the lead up to G-Day, commentators published a voluminous amount of materials in legal journals, newsletters, and blog posts about what GDPR is, what it is supposed to accomplish, how to comply with … Continue reading this entry

Protecting IP, Finding Investors, Navigating Legislation Drive Discussion at Foley’s Emerging Automotive Technologies Program

emerging
Fully connected and self-driving cars are here. Improvements to alternative energy sources for vehicles continue to advance at a rapid pace. The automotive industry is potentially facing dramatic new legal and regulatory challenges. And the road ahead shows no signs of slowing down.… Continue reading this entry

Highlights from the Foley & Lardner LLP/BNY Mellon Wealth Management Tech X 2018 Conference

What lessons can be learned from serial and successful entrepreneurs?  How does one build a great team? What challenges and opportunities do today’s business owners and entrepreneurs face? How secure is your internet-connected technology from cyberattack?… Continue reading this entry

DFW: Cybersecurity, Data Security, and Fraud Risk – What CEOs Need to Know

Cyber threats, data breaches, and corporate fraud have led to the downfall of entire organizations, massive investment losses, significant legal costs, and more than a few top executives and directors losing their jobs and their reputations. As CEO’s, we must ensure that our companies’ most important business assets remain secure and that we address threats … Continue reading this entry

Doing Security Policies Right

To maximize the effectiveness of your business’ security policy, consider these five essential areas during the creation and deployment stages. Most sophisticated businesses have at least some form of a security policy for their organizations.  Unfortunately, all too often, those policies are inadequate, fail to comply with applicable regulatory requirements, are profoundly complex and difficult … Continue reading this entry

How to Avoid Security Assessment Cost Overruns

Engaging a third-party assessment expert in conducting a review of a business’ security measures is a cornerstone of good security practice.  Among other things, assessments can identify hidden vulnerabilities in a business’ systems and remediate them before they become a problem.… Continue reading this entry

Foley & Lardner to Host 2018 Brainbabe - STEAM Conference Connection Kick-off

Please join Foley’s Technology Industry Team on Thursday, January 25, 2018 at Foley’s Boston office (111 Huntington Avenue, 25th Floor, Boston, MA 02119) as we host Brainbabe’s STEAM Conference Connection Kick-off. Click HERE to register. Deidre Diamond, CyberSN and Brainbabe Founder and CEO will be presenting. This is a MUST ATTEND event for all cyber … Continue reading this entry

Companies Outside Retail and Financial Industries May Have Additional Arguments to Challenge Standing in Data Breach Cases

The data breach at the U.S. Office of Personnel Management was one of the most serious and possibly one of the top 10 largest data breaches of the 21st century, compromising background investigation records for some 22 million current and former federal employees.  But a class action lawsuit brought on behalf of those employees was … Continue reading this entry

The Impact of Employee Training on Cybersecurity Breaches

Every organization is exposed to information security threats daily. It is essential that organizations have an information security protection program that is properly designed, documented, executed, and updated to minimize exposure to information loss, disruption of operations, and liability to third parties and regulators. An effective cybersecurity risk management program requires an effective governance structure … Continue reading this entry

November 2017 Midwest Cyber Security Alliance Meeting

cyber security
Foley & Lardner Partner Jennifer Rathburn is gearing up to host the November meeting of the Midwest Cyber Security Alliance. Jennifer will be joined by Joseph Abrenio, Founder and CEO of CyberSquire, and John Orbe, Vice President, Government, Education & Medical, Americas Enterprise at Juniper Networks.… Continue reading this entry