Yahoo’s announcement that a hacker exposed the information of over 500 million of its users is a strong reminder to all companies the importance of a breach response plan. Here we outline some tips for key elements of such a plan. READ MORE
(By accessing, browsing or using the pages below, you agree to the Blog Conditions of Use/Disclaimer available under "Links.")
Yahoo’s announcement that a hacker exposed the information of over 500 million of its users is a strong reminder to all companies the importance of a breach response plan. Here we outline some tips for key elements of such a plan. READ MORE
A set of joint resources from NIST and FAIR can help cybersecurity professionals to both prioritize risks in their organization and allocate security resources to the most critical areas of exposure. READ MORE
With the passage of the Illinois Personal Information Protection Act (HB1260) last month, Illinois substantially broadened the definition of personally identifiable information, and imposed requirements on data collectors for the protection of Illinois residents’ information. READ MORE
NOTICE.
Although we would like to hear from you, we cannot represent you until we know that
doing so will not create a conflict of interest. Also, we cannot treat unsolicited
information as confidential. Accordingly, please do not send us any information
about any matter that may involve you until you receive a written statement from
us that we represent you (an ‘engagement letter’).
By clicking the ‘ACCEPT’ button, you agree that we may review any information you transmit to us. You recognize that our review of your information, even if you submitted it in a good faith effort to retain us, and, further, even if you consider it confidential, does not preclude us from representing another client directly adverse to you, even in a matter where that information could and will be used against you. Please click the ‘ACCEPT’ button if you understand and accept the foregoing statement and wish to proceed.