We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.

Search results

Order by: most recent most popular relevance



Results: 1-10 of 24,323

Cyber criminals don’t dig mile long tunnels
  • Bryan Cave LLP
  • USA
  • September 1 2015

Digging a tunnel for a mile so that El Chapo could slip into the shaft through his shower and disappear from a high security Mexican prison is


Chip-enabled point of sale terminal deadline: October 1, 2015
  • Hall Render Killian Heath & Lyman PC
  • USA
  • September 1 2015

Hospitals and other health care providers may be liable for fraudulent use of credit cards at their facilities effective October 1, 2015 if they do


Cybersecurity as a global concern in need of global solutions: some recent financial regulatory developments
  • Paul Hastings LLP
  • USA
  • September 1 2015

U.S. financial regulators are increasingly recognizing the threat of cyberattacks as one of “the biggest systemic risks we have facing us.” The


Energy regulators respond to increasing cyber threats to the grid
  • Quarles & Brady LLP
  • USA
  • September 1 2015

As anyone who even casually watches the nightly news can tell you, breaches of customer and corporate data can cause serious financial, legal, and


FTC the federal Internet cop
  • Duane Morris LLP
  • USA
  • September 1 2015

The Internet brings people together in all sorts of new ways. And when people come together, there can be all sorts of problems. So, is there a


Hard lessons from the Wyndham decision: what businesses must know about the FTC’s authority to regulate data security
  • Dykema Gossett PLLC
  • USA
  • September 1 2015

In a unanimous decision, the U.S. Court of Appeals for the Third Circuit upheld the Federal Trade Commission's ("FTC") authority to bring actions


The causes of healthcare breaches at a glance
  • Bryan Cave LLP
  • USA
  • September 1 2015

Pursuant to the Health Insur-ance Portability and Accountability Act of 1996 ("HIPAA"), covered entities (e.g. healthcare providers and health plans


NIST standards provides an oasis of mobile device security in the EHR desert
  • McBrayer McGinnis Leslie & Kirkland PLLC
  • USA
  • September 1 2015

The healthcare industry has long awaited some certainty in the arena of mobile devices in light of the continued push for electronic health records


California Governor signs Executive Order aimed at strengthening cybersecurity strategy
  • BuckleySandler LLP
  • USA
  • September 1 2015

On August 31, California Governor Edmund G. Brown signed Executive Order B-34-15. A response to recent cyber-attacks, this order is intended to


The $225,000 laptop: losing confidential customer data will cost you
  • Briggs and Morgan
  • USA
  • September 1 2015

One of the many examples we use in presenting seminars and panel discussions on cyber security is the "lost laptop problem:" how do broker dealers