Data protection will need to be on the boardroom agenda.
This is a milestone moment in the world of data protection law. On 15 December 2015, after 3 years of detailed...
New guides for carrying out PIAs (Privacy Impact Assessments) have been published by the CNIL. The method will help data controllers to implement Privacy by design.
From good practice to a real...
The IAIS, whose members are insurance market regulators based across the globe, said insurers face potential loss of confidential data, disruption of operations and reputational loss as a...
The trends from last year’s inaugural BakerHostetler Data Security Incident Response Report and this year’s edition drive one primary recommendation— the continued need for companies to be...
After over three years of discussion at many levels, the new EU data protection framework has finally been agreed. It takes the form of a Regulation – the General Data Protection...
GDPR will apply to almost all organizations who monitor or process the personal data of European citizens, without any regard to the physical location of the processor or controller. Although the...
This is despite the fact the cyber insurance market is expected to reach $7.5bn by the end of the decade
Less than half (41 percent) of firms are fully insured for both...
New EU data protection rules which aim to give citizens back control of their personal data and create a high, uniform level of data protection across the EU fit for the digital era was given their...
Ransomware are a growing threat to business operations and reputation. In this article Peter Godden explains how business continuity and disaster recovery technologies can help to provide protection...
When it comes to buying cyber insurance, businesses can take comfort that they have mitigated the financial risks that come with a data breach. Just not all of them.
Target Corporation’s...
Cyber-attacks represent one of the most significant threats facing international businesses today, and are increasing in severity. For the insurance industry, such risk represents a highly...
Cyber risk is an escalating threat and one of the most challenging issues facing the world today. Attacks are becoming more frequent, more intense and more sophisticated. Motivations are wide-ranging...
On January 25, 2012, the European Commission released its widely anticipated data protection legislative framework proposal ("Draft Regulation"), intended to replace Directive 95/46/EC. The...
In the blockbuster film Terminator II, a young John Connor (played by Edward Furlong) steals money from an ATM using his laptop. The film was released in 1991, however, the story was set in 1995....
For businesses and nonprofit organizations searching for cyber insurance, it is important to know if your coverage limits are adequate. Whether you are in the market for a new policy or renewing an...
LONDON—Do you know what to do if your hotel has been hacked? Unfortunately, no company is immune to the problem, as illustrated in recently publicized events involving major hotel chains. Hackers...
CHICAGO--(BUSINESS WIRE)--Cyber risk insurance is the fastest growing segment in property/casualty insurance with an estimated $3 billion in premiums in 2015 and anticipated to triple in four years....
Washington, D.C. – The market for cyber insurance, a product that did not even exist before the mid-1990s, is booming.
A new report from the Bipartisan Policy Center’s insurance task...
TORONTO, March 17, 2016 /CNW/ - This Fraud Awareness Month, Insurance Bureau of Canada (IBC) offers its Top 10 tips to protect against cyber fraud and online identity...
The first wireless radio equipment was used aboard Lightship 70 in 1899.[1] Over the next 115 years, the use of technology in the maritime domain has driven rapid change in the United States Coast...