{ Banner Image }

Showing 31 posts in Cybersecurity.

Why Public WiFi is a Health Hazard

In the age of the mobile device, public WiFi is something that most of us will regularly use; whether in a coffee shop getting some extra work done or just waiting in an office area. The risks of this "free" commodity, however, are coming in faster than security specialists can deal with them. Read More ›

Categories: Cybersecurity, Did you Know?, Digital Assets

Ohio Enacts Unique Safe Harbor to Reduce Data Breach Litigation Risks

On November 2, 2018, Ohio became the most recent state to update its data breach laws by enacting the Ohio Data Protection Act. Read More ›

Categories: Cybersecurity, Digital Assets

Legal Essentials: Shifting Focus to Data Protection, Cybersecurity and Vendor Management

For an introduction to these areas, visit Taylor's previous video, an Introduction to Data Privacy, Cybersecurity and Third Party Vendor Management. 

In recent years, security risks and data breaches have increased and businesses are working to be better equipped to respond to emergency cyber attack and breach situations.  Read More ›

Categories: Cloud Computing, Cybersecurity, IT Contracts, Privacy

Legal Essentials: An Introduction to Data Privacy, Cybersecurity and Third Party Vendor Management

With the rise of data breaches and regulatory enforcement, businesses must acknowledge cybersecurity and data privacy issues as significant business risks. Read More ›

Categories: Cloud Computing, Cybersecurity, Digital Assets, IT Contracts

Cybersecurity Concerns in Health Care

Health care systems are eager to adapt to newer technology and widespread network options, all in the name of giving patients the best possible care. However, this comes with a price: more outlets for hackers to breach valuable data.  Read More ›

Categories: Cybersecurity, Electronic Health Records

GDPR Has Arrived and My Company Isn't Ready. Now What?

It's not hyperbole to say that the General Data Protection Regulation's May 25th enforcement date marks one of the largest shifts in the history of privacy laws. Read More ›

Categories: Cloud Computing, Compliance, Cybersecurity, Digital Assets, Liability, News, Privacy

Provisions for Vendor Contracts

This is the second article in a series on Third Party and Vendor Management. The first article discussed pertinent considerations for vendor contracts in the context of cybersecurity. Read More ›

Categories: Contracts, Cybersecurity, Did you Know?, Digital Assets

Business Rap: Preventing Phishing Scams

On January 25, Foster Swift attorney John Mashni sat down for a discussion on Business Rap, a weekly radio show and podcast that features Mid-Michigan's brightest business owners and decision makers discussing business trends, challenges and politics affecting employers and business owners. Read More ›

Categories: Criminal, Cybersecurity, Did you Know?, Digital Assets

Potential $13.5 Million Uber Fine Highlights the Importance of Risk-Based Breach Response

The legal fallout from ridesharing service Uber's 2016 data breach, which affected approximately 57 million riders and drivers, has been significant. Read More ›

Categories: Cybersecurity, Did you Know?, Lawsuit

Considerations for Vendor Contracts

This is the first article in a series on Third Party and Vendor Management. The next article in this series discusses provisions for vendor contracts. Read More ›

Categories: Cloud Computing, Cybersecurity, Liability, Privacy