Close X
Attorney Spotlight

What emerging trend in shareholder litigation does Britt Latham find most interesting in his practice today?    Find out more>

Search

Close X

Experience

Search our Experience

Experience Spotlight

Envision to Sell to KKR for $9.9 Billion

We represented Envision Healthcare Corporation (NYSE: EVHC) in its definitive agreement to sell to KKR in an all-cash transaction for $9.9 billion, including debt. KKR will pay $46 per Envision share in cash to buy the company, marking a 32 percent premium to the company's volume-weighted average share price from November 1, when Envision announced it was considering its options. The transaction is expected to close the fourth quarter of 2018. Read more


Envision Healthcare

Close X

Thought Leadership

Enter your search terms in the relevant box(es) below to search for specific Thought Leadership.
To see a recent listing of Thought Leadership, click the blue Search button below.

Thought Leadership Spotlight

Six Things to Know Before Buying a Physician Practice spotlight

Dermatology, ophthalmology, radiology, urology…the list goes on. Yet, in any physician practice management transaction, there are six key considerations that apply and, if not carefully managed, can derail a transaction. Download the 6 Things to Know Before Buying a Physician Practice to keep your physician practice management transactions on track.

Click here to download the guide.

Obama Administration Releases Long-Awaited Cybersecurity Guidelines and Recommendations

Publications

February 13, 2014

On February 12, 2014, exactly one year after issuing an Executive Order directing the National Institute of Standards and Technology (NIST) to develop a framework for promoting cybersecurity, the Obama administration released the final version of NIST's guidelines for cybersecurity standards and practices. Spanning over 40 pages, the "Framework for Improving Critical Infrastructure Cybersecurity" (FICIC) (Version 1.0) sets out a series of best practices for protection of a business' systems again cyber intrusion and other cyber risks. The FICIC closely follows the recommendations found in the preliminary draft issued by the NIST on October 22, 2013.

The new guidance, particularly directed at the nation's critical infrastructure (including financial institutions), is based on the core principles of cybersecurity – identification, protection, detection, response and remediation. Rather than resting on repetition of these general concepts, the FICIC drills down through several levels, detailing steps a business should take to protect the integrity of its systems and data. In addition, the FICIC organizes businesses into four tiers based on their awareness of cyber risks, and their preparedness to address those risks. The FICIC is accompanied by a nine page "Roadmap for Improving Critical Infrastructure Cybersecurity," known as the "roadmap," outlining the NIST's next steps and areas in need of further attention and improvement.

Borrowing from existing standards and stressing the "flexibility" of the new guidelines, the President's Assistant for Homeland Security and Counterterrorism characterized the FICIC as a "common language" to discuss cybersecurity. The White House further emphasized that the FICIC is a "living document" to align cybersecurity practices with the business sector and adapt to the ever-changing cyberliability landscape. 

The framework provides concrete recommendations regarding cybersecurity issues that are useful guideposts for companies and organizations to improve their policies and procedures, especially when used in conjunction with other industry standards and guidance. In particular, the framework provides specific direction for conducting and documenting periodic risk assessments. Both the framework and the roadmap may be updated and strengthened over the next 90 days to establish milestones and accountability for implementation, and to address certain areas that are noticeably absent, such as information sharing.

Although voluntary, businesses should pay close attention to the recommendations set forth in the FICIC, as they are likely to be identified as industry best practices, effectively setting the standards for evaluating a company’s cybersecurity plan. Failure to follow, much less consider, the guidelines in the FICIC may put a business at risk for cyber intrusion, decrease its ability to remain competitive, and likely will be cited as damaging evidence in a lawsuit or regulatory investigation.

Our Data Security, Privacy and Cyberliability team has extensive experience dealing with cyber incidents, and in providing practical advice to companies seeking to maximize their cybersecurity and minimize their cyberliability exposure. We welcome your questions about the FICIC, as well as any other aspect of cybersecurity risks, principles, or procedures.

For more information about the content of this alert, please contact one of the authors.


Related Professionals

Related Services

Notice

Visiting, or interacting with, this website does not constitute an attorney-client relationship. Although we are always interested in hearing from visitors to our website, we cannot accept representation on a new matter from either existing clients or new clients until we know that we do not have a conflict of interest that would prevent us from doing so. Therefore, please do not send us any information about any new matter that may involve a potential legal representation until we have confirmed that a conflict of interest does not exist and we have expressly agreed in writing to the representation. Until there is such an agreement, we will not be deemed to have given you any advice, any information you send may not be deemed privileged and confidential, and we may be able to represent adverse parties.