The Cybersecurity Law Report

Incisive intelligence on cybersecurity law and regulation

Articles By Topic

By Topic: Data Leaks

  • From Vol. 1 No.1 (Apr. 8, 2015)

    Ten Actions for Effective Data Risk Management

    High-profile data breaches expose breached companies to intense negative scrutiny from lawmakers, regulators, media, customers and plaintiffs’ attorneys.  But not every data breach is a headline-grabbing theft of consumer credit card data – and small breaches cannot be ignored.  Effective information risk management to prevent data leaks, the unauthorized transfer of information to the outside world, and security breach incidents requires a top-driven coordinated information security compliance program that is implemented on a company-wide basis.  In a guest article, Jesse M. Brody, a partner at Manatt Phelps & Phillips, provides ten immediate steps companies should take to prevent data leaks and larger breach events.

    Read Full Article …