Close Contact Us
Tap Here To Call Us

Articles Posted in Policies and Procedures

Updated:

To Pay or Not to Pay – There Isn’t a Question

Every ransomware attack requires the victims to make a hard decision – whether or not to pay the ransom. The decision is often made on the basis of past mistakes – failure to implement basic security (such as not implementing multi-factor authentication), failure to train personnel in recognizing phishing, or…

Updated:

Time to Update your Privacy Policy

In 2024, privacy laws adopted by Montana, Oregon, Texas and Utah will become effective. While the laws have much in common (and are similar to the laws already in effect), they each have special characteristics, and companies will need to evaluate how they impact operations, disclosures and policies. What do…

Updated:

Time is Short – Reporting your Data Breach

Companies that are subject to the registration and disclosure requirements of the United States Securities Act and Securities Exchange Act face the challenge of complying with a broad variety of detailed regulations addressing their disclosure and reporting obligations. The Securities Exchange Commission recently adopted regulations which will have an impact…

Updated:

What Businesses Need to Know About the New California Privacy Rights Act of 2020

Many races and initiatives that California voters considered on November 3 are still undecided, but Proposition 24, the California Privacy Rights Act of 2020 (the “CPRA”) isn’t one of them. The California electorate approved Proposition 24 by a comfortable margin – 56% of Californians voted in favor. Like its predecessor…

Updated:

Online Workshop — A Reasonable Approach to Reasonable Security

Are your cybersecurity management practices reasonable? Do you know your risk tolerance? Are you covering all the cybersecurity bases that make up reasonable cybersecurity? The California Consumer Privacy Act (CCPA) and other emerging laws require organizations to have “reasonable cybersecurity practices.” The challenge is that there is no accepted definition…

Updated:

The Blackbaud Breach – Focus on Vendors

The Blackbaud Breach In July of this year, Blackbaud, a U.S. based cloud computing provider and one of the world’s largest providers of administration, fundraising, and financial management software, notified its clients that it had discovered and stopped a ransomware attack.  In a public statement, Blackbaud described the attack: In…

Updated:

Webinar – The Right Stuff: Validating Reasonable Information Security

Michael A. Gold, co-chair of JMBM’s Cybersecurity & Privacy Group, will host a panel of industry leading experts for the webinar, The Right Stuff: Validating Reasonable Information Security Date: Thursday, June 18, 2020 Time: 10 AM – 11:15 AM PDT; 1 PM –  1:15 PM EDT Register Now Most organizations…

Updated:

Your Company’s Privacy Policy – the Last Step, not the First

As a privacy and cybersecurity lawyer, I’m often asked by clients and potential clients about preparing a privacy policy – whether they need one, and how much it costs. And underlying the question is an assumption – privacy policies are really just formalities, and all they need to do is…

Updated:

Webinar: Privacy and Information Security – Best Practices and Imperatives

Robert E. Braun, chair of JMBM’s Cybersecurity & Privacy Group, will be the keynote speaker for the webinar, Privacy and Information Security – Best Practices and Imperatives. Date: Wednesday, May 27, 2020 Time: 2:00 PM Pacific Time Register Now As companies shift to a remote working environment due to the…

Contact Us