Using enforcement actions and guidance materials from the Securities and Exchange Commission and the Federal Trade Commission, Forrest E. Lind III compares the agencies\u27 approaches to cybersecurity regulation, forecasts the future of cybersecurity regulation, and discusses how the increase in cybersecurity regulations will affect regulated entities. The adequacy of a company\u27s cybersecurity measures is a growing source of liability because the SEC has begun punishing companies based on how they anticipate, and respond to, cyberattacks. This Perspective analyzes the character of the agencies\u27 actions and finds that the SEC will be a more aggressive enforcer than the FTC. After noting the FTC\u27s history with cybersecurity measures,...
While cybersecurity has been an important issue for all business sectors due to the rapid developmen...
Breach notification laws have been a major driver of data protection efforts in U.S. organizations f...
In an age where so many businesses and systems are reliant on computer systems, there is a large inc...
Cybersecurity regulation presents an interesting quandary where, because private entities possess th...
Privacy has come to the forefront of the technology world as third party hackers are constantly atta...
In today’s technologically dependent world, concerns about cybersecurity, data breaches, and comprom...
Cybersecurity regulations have proliferated over the past few years as the significance of the threa...
The conventional wisdom is that this country’s privately owned critical infrastructure—banks, teleco...
The protection of cyberspace has become one of the highest security priorities of governments worldw...
A changing cybersecurity environment now poses a significant corporate-governance challenge. Althoug...
Cyberattacks are occurring at an accelerating pace. Foreign nations are increasingly utilizing hacki...
This paper documents the reporting to the SEC of 197 major incidents of cybersecurity breaches among...
Due to society’s increasing reliance on technology (e.g., financial transactions, critical infrastru...
This article focuses on the role of government in relation to cybersecurity. Traditionally, cyberse...
There are increasing obligations on companies to report cybersecurity incidents to national and int...
While cybersecurity has been an important issue for all business sectors due to the rapid developmen...
Breach notification laws have been a major driver of data protection efforts in U.S. organizations f...
In an age where so many businesses and systems are reliant on computer systems, there is a large inc...
Cybersecurity regulation presents an interesting quandary where, because private entities possess th...
Privacy has come to the forefront of the technology world as third party hackers are constantly atta...
In today’s technologically dependent world, concerns about cybersecurity, data breaches, and comprom...
Cybersecurity regulations have proliferated over the past few years as the significance of the threa...
The conventional wisdom is that this country’s privately owned critical infrastructure—banks, teleco...
The protection of cyberspace has become one of the highest security priorities of governments worldw...
A changing cybersecurity environment now poses a significant corporate-governance challenge. Althoug...
Cyberattacks are occurring at an accelerating pace. Foreign nations are increasingly utilizing hacki...
This paper documents the reporting to the SEC of 197 major incidents of cybersecurity breaches among...
Due to society’s increasing reliance on technology (e.g., financial transactions, critical infrastru...
This article focuses on the role of government in relation to cybersecurity. Traditionally, cyberse...
There are increasing obligations on companies to report cybersecurity incidents to national and int...
While cybersecurity has been an important issue for all business sectors due to the rapid developmen...
Breach notification laws have been a major driver of data protection efforts in U.S. organizations f...
In an age where so many businesses and systems are reliant on computer systems, there is a large inc...