Latest Posts › Corporate Counsel

Share:

U.S. and British Law Enforcement Agencies Issue Unprecedented Warning About Chinese Espionage Efforts

On July 6, 2022, the heads of the U.S. Federal Bureau of Investigation (FBI) and the British MI5 law enforcement agencies issued an unprecedented joint statement warning about espionage and other economic threats from China....more

State Data Breach Notification Laws - March 2022

While most state data breach notification statutes contain similar components, there are important differences, meaning a one-size-fits-all approach to notification will not suffice. What’s more, as data breaches continue to...more

Practical Steps for Organizations to Use the New Standard Contractual Clauses

The European Commission adopted new versions of the Standard Contractual Clauses (SCCs) on June 4, 2021. The new SCCs finally replace the original SCCs adopted under the 1998 European Data Protection Directive (DPD) and did...more

State Data Breach Notification Laws - September 2020

While most state data breach notification statutes contain similar components, there are important differences, meaning a one-size-fits-all approach to notification will not suffice. What’s more, as data breaches continue to...more

COVID-19: Privacy and Cybersecurity Regulatory and Enforcement Guidance (Updated)

On March 19, 2020, the European Data Protection Board (EDPB) adopted a statement on the processing of personal data in the context of the COVID-19 outbreak. The EDPB made it clear that while the EU’s General Data Protection...more

Proposed Bill Would Substantially Rewrite the California Consumer Privacy Act of 2018

...On April 4, 2019, California Assembly Member Wicks proposed sweeping changes to bill AB 1760, effectively repealing the California Consumer Privacy Act of 2018 (CCPA) and replacing it with the Privacy for All Act of 2019...more

Blue Pill/Red Pill: How Officers and Board Members Can Swallow the Red Pill and See the Real World of Cybersecurity

Trying to understand how a hacker thinks can twist your brain around – while you normally think about how to make something work or why something is not working, hackers think how to get something to work in ways that it is...more

Phishing and Spear Phishing: Modern Methods Applied to Age-Old Social Engineering

It may surprise many who have observed the recent media attention of data breaches to learn that in the world of Cybersecurity, sometimes it’s the oldest attacks that find new life when they are applied in new ways. Phishing...more

8 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide