The number of cyber attacks is on the increase and so is their level of sophistication. Because insurance companies are data driven businesses holding vast amounts of customer data (personal information, health and financial data), cyber attacks are a real threat and should be prioritised as one of their key operational risks. Most of the

Automobiles are becoming part of the Internet of Things. “Connected” technologies now power telematics and infotainment systems and increasingly are deployed for driver assistance and to enhance the safe operation of autonomous vehicles. These “intelligent” vehicles rely on an ecosystem of proprietary and third-party components to gather, analyze and then react to data from both

As businesses turn to cloud computing solutions and accumulate data in the cloud, they are presented with many challenges for complying with data privacy and cybersecurity regulations. Join Linda Rhodes, Brad Peterson and Joe Pennell on November 14, 2017, for our webinar Security and Privacy in the Cloud. They will cover topics including:

  • The background

In a bylined article, Technology Transactions partners Rebecca Eisner, Joe Pennell and associate Nick Card (all Chicago) discuss the current legal and regulatory landscape for IoT and data collected through IoT systems, particularly for business (versus consumer) uses and applications, and also addresses cybersecurity, privacy, employee and other risks.

Continue reading.

On 21 December 2016, China’s National Information Security Standardization Technical Committee (NISSTC) released a set of draft information security standards (the “Standards”) for public comment. The Standards include several individual documents covering: i) personal information, ii) cybersecurity, iii) big data, iv) certain devices, and vi) industrial control systems. Even though the Standards are voluntary and

On September 30, 2016, the US Department of Homeland Security publicly released its Draft National Cyber Incident Response Plan. This draft document provides a detailed and strategic framework to guide engagement and activity on cyber incident response and is intended to be used by a full range of stakeholders, including individuals; the private and

On February 16, 2016, the federal government released new implementation guidance regarding the recently passed Cybersecurity Information Sharing Act of 2015 (CISA). In this update we discuss the four key topics addressed by the guidance, with particular emphasis on their relevance for private entities.

Continue reading.

On December 18, 2015, President Obama signed the Consolidated Appropriations Act, 2016 into law. This omnibus appropriations legislation will create significant new rules for the voluntary sharing of cybersecurity information within the private sector and with the government. Passage of the omnibus appropriations legislation thus brings to a close the multi-year debate over cybersecurity information

In May 2015, the Hong Kong Privacy Commissioner announced the results of a study carried out in October 2014, which revealed that children are now going online at a much younger age than ever before. The study revealed a fundamental lack of awareness on the part of the children themselves, their parents and teachers alike