On January 8, 2014, Senator Leahy (D-VT) reintroduced the “Personal Data Privacy and Security Act” (S. 1897) in an effort to both enhance criminal penalties for computer hacking, and create a tough Federal data breach notification statute. The bill was originally cosponsored (at the time of its introduction) by Senators Chuck Schumer (D-NY), Al Franken […]
Cybersecurity
Jim Harvey to Speak at the Institute of Continuing Legal Education in Georgia’s 2014 Banking Law Program
On February 7, Jim Harvey, co-chair of the firm’s Security Incident Management & Response team, will participate as a speaker in the ICLE’s 2014 Banking Law Program. Mr. Harvey, along with co-panelist Susan Koski, Chief Information Security Officer of Synovus Bank, will speak on “Cybersecurity-Managing Risks and Allocation of Loss”. This topic is one of […]
White House Cybersecurity Coordinator to Deliver Keynote at Law & Policy In-House Summit in Washington, D.C.
The Global Law Forum will host The Cybersecurity Law & Policy In-House Summit in Washington D.C. on January 14 and 15, 2014. The Summit will showcase panel discussions addressing a myriad of issues relevant to corporate counsel including establishing data breach response plans, understanding the cybersecurity insurance market, achieving Board of Directors and company buy-in […]
Kim Peretti and Jim Harvey to Speak at the Cybersecurity Law & Policy In-House Summit
On January 14-15, Kim Peretti and Jim Harvey, co-chairs of the firm’s Security Incident Management & Response team, will participate as speakers in the Cybersecurity Law & Policy In-House Summit. The Cybersecurity Law & Policy In-House Summit will provide up-to-date and practical strategies to proactively fortify cyber defenses and deliver best practices to mitigate liability and […]
NIST’s Preliminary Cybersecurity Framework Could Have Broad Implications for Critical, Non-Critical Infrastructure Alike
On October 22, 2013, the National Institute of Standards and Technology (NIST) released its Preliminary Cybersecurity Framework (“Framework”), marking one of the final steps in creating the “voluntary” Framework envisioned in an Obama Administration Executive Order (EO) issued earlier this year. That EO, which was designed to strengthen the cybersecurity of the United States’ critical […]