Protecting the Workforce and Information in a Global Landscape: A Legal Review

Hogan Lovells
Contact

Organizations around the world face substantial and increasing cybersecurity-related threats to operations, reputation, and the bottom line. Cyber risk profiles are changing, particularly in light of the increase in agile working arrangements driven by the COVID-19 pandemic and other factors. Organizations may have confidence that the only users remotely accessing information resources are doing so with authorized credentials, but they may not know who is using those credentials or whether authorized users are engaged in unauthorized activities. As a result, organizations need tools that monitor and assess activities associated with authorized credentials. Some such tools include user activity monitoring (UAM) solutions that record and analyze user interactions with and use of applications, databases, and other information resources. The need for such tools is increasingly recognized, even by data protection authorities.

Please see full publication below for more information.

LOADING PDF: If there are any problems, click here to download the file.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Hogan Lovells | Attorney Advertising

Written by:

Hogan Lovells
Contact
more
less

Hogan Lovells on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide