Header graphic for print
Password Protected Data Privacy & Security News and Trends

Category Archives: Information Management

Subscribe to Information Management RSS Feed

Allocation of Data Breach Risks and Costs in Vendor Contracts: Negotiate, Negotiate, Negotiate (And Negotiate Again!) Limitations on Liability and Indemnification

Posted in Data breach, Information Management, Notification

“A significant data breach is likely to cost the company materially, and costs could drag on for a number of years,” analyst Shlomo Rosenbaum, commenting on the Equifax breach.

Organizations increasingly rely on third-party service providers for data collection, processing, … Continue Reading

Law Firms’ Data Duty: Protecting Client Information From Cybercriminals

Posted in Cyber Insurance, Cybersecurity, Data breach, Data Security, Health Information, Information Management, Litigation, Other, Privacy

The impact from the recent Petya/NotPetya ransomware attack — or what was reported as a ransomware attack but now appears to be something even more damaging — continues to spread around the globe, with several new companies coming forward as … Continue Reading

Know Your Vendors: The Importance of Comprehensive Risk Assessment Programs

Posted in Financial Services Information Management, Information Management, Privacy

As companies continue to explore new outsourcing and cloud services models in search of improved cost and productivity efficiencies, service providers are being asked to handle increasingly sensitive types of data. However, some customers are not seeking heightened security measures … Continue Reading

The FTC Strikes Back: LifeLock, Inc. Agrees to $100 Million Payout

Posted in Consumer Privacy/FTC, Cybersecurity, FTC enforcement, Identity Theft, Information Management

On December 17, 2015, the Federal Trade Commission (FTC) announced a $100 million settlement with LifeLock, Inc., to resolve litigation with the FTC and a national class of consumers relating to LifeLock’s marketing representations and information security programs.  The settlement … Continue Reading