data security

Upcoming Webinar: Data, Privacy and Cyber Security Issues in International Arbitration

Join Orrick and the Silicon Valley Arbitration and Mediation Center (SVAMC) on November 4, 2020, for a complimentary webinar on how arbitration can deal with substantive data, privacy and cyber issues arising in international disputes. Orrick’s James Hargrove (International Arbitration partner/Geneva and London) and Keily Blair (Cyber, Privacy & Data Innovation partner/London) will join other panelists to address current topics in arbitrating data and cyber issues, for example, arbitrability, mass arbitrations, multiplicity of proceedings, follow-on claims from data breaches, territorial limitations, interim and final relief and sanctions, future issues – how will arbitration deal with the ever-growing importance and value of data. Keily, James and their fellow panelists will put an up-to-date focus on data, privacy and cyber issues in arbitration proceedings, with a discussion of current practices, remote hearings and technological advances, hearings protocols, increased cyber risks and steps to protect data integrity.  Learn more and register here.

Webinar  |  November 4, 2020  |  12:00pm – 1:00pm EST

FTC/FCC MOU: Even the Justice League Needs It In Writing

data security

On November 13, 2015, the Federal Trade Commission and the Federal Communications Commission entered into a Memorandum of Understanding to address coordination of consumer protection actions by each agency.  Following a wave of what observers perceive as a turf battle between the FTC and FCC (namely the reclassification of broadband internet access services as a common carrier service outside the FTC’s jurisdiction), and a dramatic increase in FCC data security regulatory enforcement actions, the MOU suggests that the FTC and FCC are in fact serious about cooperation and collaboration, especially on data security issues.  Although organizations have better transparency and predictability in the enforcement landscape, they should also anticipate more sophisticated investigations based on richer data and improved investigative techniques.

READ MORE

Six Steps for Adding WISP to Your Cybersecurity Strategy

The fact that data breaches are becoming a routine occurrence in the life of a business is no surprise considering the drastic increase over recent years in the volume of data that companies maintain. While routine, breaches are nonetheless an extremely costly part of doing business. According to a 2014 research report by the Ponemon Institute, the average cost of post-breach activities is $1.6 million, with the average cost of lost business an astounding $3.2 million. Since some form of a data breach incident is highly likely, one solid defense is to create a written information security program (WISP). However, a WISP must be more than mere words on paper. In order to create an effective program, a company must comply with its WISP, in conjunction with other measures. And the company’s compliance efforts should be led by top executives in order to underscore the importance of the security issues involved.

READ MORE