We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.
Results 1 to 5 of 15
Most popular |Most recent


Moving Beyond Passwords - Does Your Face Raise Privacy Concerns?

USA - November 8 2017 Phishing attacks continue to be the root cause of a considerable number of data breaches. Typically, these incidents occur when employees are enticed...


Deeper Dive: Be Prepared for Regulatory Investigations in the Wake of a Security Incident

USA - April 27 2017 Your company had a data security event. After an investigation, it was determined that notifications were required, and the incident was made public...


Deeper Dive: Regulatory Investigations Following a Reported Breach

USA - May 2 2016 We recently released our 2016 Data Security Incident Response Report (“Report”), which provides lessons learned and metrics related to over 300 data...


Government Access to Private Data: Microsoft Opens a New Front in the Battle for Consumer Privacy

USA - April 19 2016 Prior to the Information Age, sensitive papers were stored in file cabinets and drawers. When home computers arrived, information was digitized and...


Encryption: the battle between privacy and counterterrorism

USA - January 28 2016 For privacy advocates, it is universally accepted that encryption is a very good thing. After all, encrypted data is deemed a safe harbor under HIPAA...