A recent report published by IBM’s Security Services offers valuable insight into the current landscape of cybersecurity risk. Through the aggregation of client data from 2015, the report provides topical information on subjects ranging from the most frequently attacked industries to the commonality found between types of attackers and their attacks. As the report makes abundantly clear, no business, especially those in the healthcare and financial sectors, remains exempt from cybersecurity threats. According to the report, the five most attacked industries in 2015 were as follows: Healthcare Manufacturing Financial Services Government Transportation HEALTHCARE Healthcare’s occupation of the top spot should come as no surprise. 2015 was so replete with healthcare data breaches that many, IBM included, described it as “the year of the healthcare breach.” Subsumed within the United States Health and Human Services (HHS), the Office of Civil Rights (OCR) enforces the Healthcare Insurance Portability and Accountability Act (otherwise known as HIPAA). As part of its enforcement duties, the OCR provides online notification for every breach of unsecured protected health information […]Continue Reading
Nashville Cybersecurity SpecialistsThe cybersecurity landscape can be difficult to navigate, which is why our law firm provides strategic cybersecurity services for entrepreneurs, small business owners, business franchise owners, and corporations of all sizes. Our cybersecurity lawyers are experts in all areas of privacy protection and information security. Whether you require legal assistance for implementing cybersecurity best practices to keep your company data confidential, need help understanding how to protect against identity theft, or need legal counsel to appropriately respond to a data breach, you can count on our law firm to assist you.
Our Cybersecurity ServicesAt Thompson Burton, we are dedicated to helping our clients prepare in case of a cyber attack or privacy issue. However, should a cybersecurity threat arise, our attorneys have effective strategies in place to help clients act as swiftly as possible. Our full range of cybersecurity services includes:
- Cybersecurity risk assessment
- Cybersecurity litigation management
- Cybersecurity insurance
- Data security policy creation
- General data protection regulation
- Data breach notification laws
- Identity theft laws
- Information security
- Cyberbullying laws
- Invasion of privacy claims
Contact Our Cybersecurity LawyersWithout careful development, implementation, and enforcement of information security policies, privacy policies, and other cybersecurity best practices, companies become more vulnerable to cyber attacks and potential lawsuits. Our attorneys at Thompson Burton want to make sure this never happens to your company. Contact us to learn more about our cybersecurity services and how we can help you keep all sensitive business information confidential and protected.
As one of the forty-seven states with cybersecurity breach notification laws, the Tennessee legislature just amended its previously existing law. Since California in 2002, states have undertaken the act of imposing security breach notification obligations on entities that own and possess personal information. With the enactment of a more encompassing and definitive breach notification protocol, Tennessee has taken a small step forward in prioritizing data security. THE CURRENT LAW Codified at T.C.A. § 47-18-2107 under the Tennessee Identity Theft Deterrence Act of 1999 and entitled, “Release of Personal Information,” Tennessee follows a statutory framework common to states around the country. The statute begins by defining personal information, breach of security, and information holder. “Personal information” is unencrypted information concerning a person’s individual’s first name or first initial and last name, in combination with any one or more of the following: (i) social security number; (ii) driver’s license number; (iii) account number, credit or debit card number, combined with any security, access, or […]Continue Reading