The Cybersecurity Law Report

Incisive intelligence on cybersecurity law and regulation

Articles By Topic

By Topic: Australia

  • From Vol. 2 No.20 (Oct. 5, 2016)

    FCA Director Lays Out Cybersecurity Expectations for Financial Services Firms

    To safeguard sensitive personal and financial data and assets, and to protect the stability of the financial markets, an industry-wide “security culture” is necessary in the financial services sector. Firms of all sizes and profiles must actively and continually refine their governance, detection and prevention methods in response to the ever-evolving threat. This was the theme of a speech delivered by Nausicaa Delfas, Director of Specialist Supervision for the U.K. Financial Conduct Authority (FCA), at the recent FT Cyber Security Summit.  The key points of the speech are directed at financial firms, but offer useful insight into the U.K. regulator’s priorities and advice for any company looking to improve its “security culture.” For a comparison of the FCA and SEC stances on cybersecurity, see our two-part series “Navigating FCA and SEC Cybersecurity Expectations (Part One of Two)” (Jan. 6, 2016); Part Two (Jan. 20, 2016). 

    Read Full Article …
  • From Vol. 2 No.18 (Sep. 7, 2016)

    What Cyber Insurance Cases Teach About Picking the Best Policy (Part One of Two)

    As cybersecurity-related insurance claims proliferate and litigation ensues, more jurisprudence in the area is being developed to guide companies as they purchase policies. Companies looking to purchase or amend their coverage can learn from examples of how other claims have fared under judicial scrutiny. This first part of our article series covering a recent Knowledge Group webinar includes the panelists’ discussion of the current cyber insurance market and the issue of publication under CGL policies. The speakers also analyze recent cases to extract the questions companies should be asking insurers about key policy definitions and exclusions. The second article will focus on lessons from the recent Cottage Health  case and discuss coverage considerations for physical damage. See also “Building a Strong Cyber Insurance Policy to Weather the Potential Storm” Part One (Nov. 25, 2015); Part Two (Dec. 9, 2015).

    Read Full Article …
  • From Vol. 2 No.7 (Mar. 30, 2016)

    Steps for Companies to Take This Week, This Month and This Year to Meet the Challenges of International Cyberspace Governance

    The borderless nature of cyberspace demands adequate global security and governance, and companies must protect their data across jurisdictions. At the recent 2016 RSA Conference, experts explored the challenges of global cybersecurity and governance; identified key efforts to address these issues; provided nine practical steps companies should be taking now to protect themselves; and examined the cybersecurity laws of 13 countries. The panel featured Alan Charles Raul, a Sidley Austin partner; John Smith, Raytheon vice president, legal, cybersecurity and privacy; and Michael Sulmeyer, director of the Cyber Security Project at Harvard Kennedy School’s Belfer Center. See also “Deal Struck to Maintain the Transatlantic Data Flow” (Feb. 17, 2016).

    Read Full Article …
  • From Vol. 2 No.5 (Mar. 2, 2016)

    Synthesizing Breach Notification Laws in the U.S. and Across the Globe

    Does your company have a comprehensive breach disclosure plan that complies with regulatory and legal obligations across the globe? In a recent panel held at Georgetown Law School, Harriet Pearson and Allison Bender, a partner and associate, respectively, at Hogan Lovells, discussed the changing legal landscape of breach notification obligations, including the proliferation of disclosure obligations at the state, national and transnational level, as well as disclosure obligations among organizations. See “After a Cyber Breach, What Laws Are in Play and Who Is Enforcing Them?” (May 20, 2015).

    Read Full Article …