Get ready for a new wave of breach notification laws

Posted on Mar 01 2011 by

For businesses that don’t comply with these new regulations, stiff penalties will be added to the burdensome costs of breaches (and how can you even tabulate costs like the loss of public trust?) The new regulations headed our way in 2011 provide one more reason for businesses to protect themselves from breaches, swiftly take action when a breach has been detected, and stay informed about the legal currents that are taking shape.


Develop a data breach response plan now to be ready to efficiently address a breach as soon as it is reported

Posted on Feb 22 2011 by

The proliferation of state data breach notification laws, substantive state information security laws (such as the Massachusetts data security standards), and FTC and private lawsuits on information security matters has led to heightened attention to information security in both IT budgets and staffing and in terms of legal resources. With budget pressures all around (not to mention time pressures and the pressures of other duties that in-house counsel already has), the question becomes: How can my organization lower the time and dollar costs associated with information security when there is a breach?


Data security law in 2011: States remain the center of attention

Posted on Feb 17 2011 by

While state laws requiring “reasonable” data security have had a positive impact, data breach notification laws have had the most profound effect on the improvement of data security. These laws have motivated companies – through negative incentives – to improve data security to avoid publicity, embarrassment, and the risk of notification.


10 ways that breaches burn business

Posted on Feb 15 2011 by

Don’t let your bottom line go up in flames: understand how security breaches impact your business and take aggressive action to avert disaster.


Understanding the risks of chip and PIN credit card verification

Posted on Feb 07 2011 by

The point of sale chip and PIN payment technology is believed to be a safer form of payment than the common magnetic striped credit card. The new technology uses a card with an embedded microchip that requires the consumer to enter a unique PIN through a reader to make payment. So why aren’t more businesses adopting this technology?


Stopping healthcare fraud with tools used in other industries

Posted on Feb 01 2011 by

A few weeks ago I discussed a few preventative measures a healthcare business can implement to protect itself from the damages of medical fraud.  However, the fight against medical fraud requires support from many groups, including the U.S. Government.  Bringing new tools to the fight, the Obama Administration recently announced aggressive new measures it is […]


Protecting your retail business from consumer fraud

Posted on Jan 25 2011 by

The Holiday Season is one of the busiest times of year for consumer-facing businesses.  While Holiday sales can help improve a bottom line, the increased consumer activity also brings many headaches. One of the biggest headaches is falling victim to fraud schemes from wily consumers hoping to take advantage of business who do not have […]


What do you need to know about the FTC’s report on privacy

Posted on Jan 18 2011 by

Our guest blogger this week is Kristen Mathews of Proskauer Rose LLP. Hear more from the head of the Privacy & Data Security Group and a member of the Technology, Media & Communications Group at Proskauer Rose LLP, Kristen Mathews, during our next webinar, How Policy Will Shape Data Privacy in 2011, coming up this […]


FTC report on consumer privacy

Posted on Jan 11 2011 by

Our guest blogger this week is the team at Proskauer Rose LLP. Hear more from the head of the Privacy & Data Security Group and a member of the Technology, Media & Communications Group at Proskauer Rose LLP, Kristen Mathews, during our next webinar, How Policy Will Shape Data Privacy in 2011, coming up on […]


Identity theft protection insights

Posted on Jan 04 2011 by

Consumers who are part of a data breach may be more likely to experience identity theft. Learn about sources and consequences of identity theft and the benefits of ProtectMyID.