Scarinci Hollenbeck, LLC, LLCScarinci Hollenbeck, LLC, LLC

Firm Insights

Digital Data & Cyber Security: What Businesses Need To Know

Author: Scarinci Hollenbeck, LLC

Date: April 16, 2014

Key Contacts

Back

Cybersecurity, digital data, data protection…What are these buzz words and how do they affect business?

With cybersecurity being at the forefront of clients’ and customers’ minds, businesses should take reasonable precautions to protect digital data that they create, collect, process, and/or maintain. And, according to The New York Times, companies are now requiring their law firms to increase their security and demonstrate that their confidential information is protected. In fact, it has been reported that some financial institutions are requesting their law firms to complete lengthy questionnaires detailing their security measures to protect sensitive digital data.

Photo by Ennio Dybeli on Unsplash
Photo by Ennio Dybeli on Unsplash

Reportedly, the Target data breach was accomplished by hackers using electronic credentials stolen from a vendor. Moreover, with the Internet of Things (IoT) making it easier to create, collect, process, and/or maintain data in a variety of ways, potential vulnerability points of entry are increasing in scope and frequency.  Focusing on vendor’s security measures is essential for reducing legal liability in this area. Requiring a vendor to show proof of cybersecurity can also assist with holding the vendor accountable. It will also help ensure the vendor continues to provide reliable and consistent online security efforts and stay apprised of the latest threats to data security.

Below are a few considerations regarding digital data that businesses should address:

  • Dissemination. Discuss how the vendor distributes sensitive information. For example, in many cases the vendor should be prohibited from saving sensitive digital data on portable thumb drives or emailing files to unsecure devices.
  • Networking. Discover if the vendor’s computers are linked to shared networks, especially in foreign countries where hacking may be prevalent.
  • Access. Your vendor should account for the people who will have access to the confidential information. Access should be minimized as much as possible.
  • Security. Vendors should be required to provide proof of cybersecurity and the measures that will be taken to protect business relations.

Finally, businesses may consider inquiring about obtaining additional insurance to cover digital data breaches.

No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

Scarinci Hollenbeck, LLC, LLC

Related Posts

See all
A Simple Guide to Industry Roll-Up Acquisitions post image

A Simple Guide to Industry Roll-Up Acquisitions

When done successfully, industry roll-up acquisitions can dramatically grow and strengthen your business. In this post, we break down what an industry roll-up is, why companies pursue it, and what makes it an effective (and sometimes risky) business strategy. What Is an Industry Roll-Up Acquisition? In an industry roll-up acquisition of companies, a buyer acquires multiple companies […]

Author: Dan Brecher

Link to post with title - "A Simple Guide to Industry Roll-Up Acquisitions"
Genesis Mission: How the U.S. Government’s New AI Platform Will Reshape Corporate Innovation, Risk, and Competition post image

Genesis Mission: How the U.S. Government’s New AI Platform Will Reshape Corporate Innovation, Risk, and Competition

The federal government has launched one of the most ambitious scientific initiatives in decades, and it will redefine how companies develop technology, manage risk, and compete. The Genesis Mission, created by Executive Order and driven by the Department of Energy (“DOE”), is intended to accelerate scientific discovery through a national AI platform that links supercomputers, […]

Author: Michael J. Sheppeard

Link to post with title - "Genesis Mission: How the U.S. Government’s New AI Platform Will Reshape Corporate Innovation, Risk, and Competition"
Stablecoins and the GENIUS Act: How New Global Rules Are Reshaping Compliance post image

Stablecoins and the GENIUS Act: How New Global Rules Are Reshaping Compliance

Stablecoins Leave the Grey Zone Stablecoins were supposed to be the “boring” part of crypto: digital dollars that just work. Yet for years they have lived in a regulatory no-man’s-land, classified one day as securities, the next as commodities, and sometimes as something regulators had not even named yet. That uncertainty is finally starting to […]

Author: Bryce S. Robins

Link to post with title - "Stablecoins and the GENIUS Act: How New Global Rules Are Reshaping Compliance"
Don’t Overlook the Importance of Business License Management post image

Don’t Overlook the Importance of Business License Management

If you operate a business without the proper license, you risk fines, insurance issues, reputational harm, and even business closure. Even innocent mistakes, like forgetting to renew a license, can have significant consequences, such as losing your lawsuit for payment of services that are unlicensed, which makes it imperative to have business license management procedures […]

Author: Dan Brecher

Link to post with title - "Don’t Overlook the Importance of Business License Management"
Failing to Comply With NJ Rent Control Exemption May Prove Costly post image

Failing to Comply With NJ Rent Control Exemption May Prove Costly

What Developers Need to Know About New Jersey’s Rent Control Exemption Law to Ensure Entitlement to Exemption for Newly Constructed Multi-family Housing.  A property owner in Jersey City is facing a $400 million federal class action lawsuit alleging that the landlord did not follow the procedural steps required to be eligible for exemption from local […]

Author: Patrick T. Conlon

Link to post with title - "Failing to Comply With NJ Rent Control Exemption May Prove Costly"
Crypto Securities Law: When Tokens Become Investment Contracts post image

Crypto Securities Law: When Tokens Become Investment Contracts

The application of traditional federal securities laws to crypto assets continues to evolve. In some cases, the Securities and Exchange Commission (SEC) considers tokens and other digital assets to be securities. This makes them subject to federal securities law, including the Securities Act of 1933 and the Securities Exchange Act of 1934. This classification has […]

Author: Bryce S. Robins

Link to post with title - "Crypto Securities Law: When Tokens Become Investment Contracts"

No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

Sign up to get the latest from our attorneys!

Explore What Matters Most to You.

Consider subscribing to our Firm Insights mailing list by clicking the button below so you can keep up to date with the firm`s latest articles covering various legal topics.

Stay informed and inspired with the latest updates, insights, and events from Scarinci Hollenbeck. Our resource library provides valuable content across a range of categories to keep you connected and ahead of the curve.

Let`s get in touch!

* The use of the Internet or this form for communication with the firm or any individual member of the firm does not establish an attorney-client relationship. Confidential or time-sensitive information should not be sent through this form. By providing a telephone number and submitting this form you are consenting to be contacted by SMS text message. Message & data rates may apply. Message frequency may vary. You can reply STOP to opt-out of further messaging.

Sign up to get the latest from the Scarinci Hollenbeck, LLC attorneys!