News & Analysis as of

Compliance Data Security

Compliance programs typically refer to formalized institutional procedures within corporations and organizations to detect, prevent and respond to indvidual and widespread instances of regulatory... more +
Compliance programs typically refer to formalized institutional procedures within corporations and organizations to detect, prevent and respond to indvidual and widespread instances of regulatory violations.  In response to many corporate scandals evidencing rampant unethical business practices, many nations, including the United States, began passing strict regulatory frameworks aimed at curbing these abuses. Notable pieces of legislation in this area include the U.S. Foreign Corrupt Practices Act (FCPA), Sarbanes-Oxley (SOX), and the U.K. Bribery Act, to name a few. The foregoing statutes and the severe penalties often associated with them form the basis of many modern institutional compliance programs. less -

The Data Report Episode 18: Privacy Shield

by Bilzin Sumberg on

Module Five: International Law (Part III) In this episode of The Data Report, Litigation attorney Jay Ward discusses compliance with the GDPR requirements. Jay examines "Privacy Shield," the framework that provides a set of...more

The Data Report Episode 17: What the GDPR Means for American Companies

by Bilzin Sumberg on

Module Five: International Law (Part II) In this episode of The Data Report, Litigation attorney Jay Ward expands his discussion on the GDPR, examining what it means for American companies and how thoughtful steps can be...more

Implementing China’s Cybersecurity Law

by Jones Day on

China’s Cybersecurity Law was issued on November 7, 2016, by the Standing Committee of the National People’s Congress, and it came into effect on June 1, 2017. The Cybersecurity Law marks the first comprehensive law in China...more

The Data Report Episode 3: Legal Consequences of a Data Breach

by Bilzin Sumberg on

Litigation attorney Jay Ward discusses the negative monetary impact a data breach can have on both a business and the market as a whole in this episode of The Data Report. He highlights the importance of keeping up to date on...more

The Data Report Episode 2: Data Security Is More Than an IT Issue

by Bilzin Sumberg on

Data security isn’t only about technology or privacy; it’s also about consumer law. Litigation attorney Jay Ward discusses the growing number of companies facing enforcement actions over failing to safeguard their customers'...more

The Data Report Episode 1: Information Is Currency

by Bilzin Sumberg on

Safeguarding, managing, controlling, and understanding your information is both valuable and vital. Litigation attorney Jay Ward begins building the foundation for understanding more complicated aspects of information...more

The Cyberspace Administration of China Released the First Batch of Network Products that Are Subject to Security Review

by Dechert LLP on

The Cyberspace Administration of China ("CAC") recently released the first batch of "Catalog" - a listing of the specific network products that have been identified for review under China's New Cybersecurity Law. This article...more

Hogan Lovells China Desk Brochure

by Hogan Lovells on

A bridge between China and Europe, the Middle East and Africa - The Hogan Lovells China Desk seeks to help you benefit from the opportunities arising from the evergrowing economic ties between the EMEA region and China....more

Over-Analyzed and Under-Protected: Cybersecurity Compliance is Actually Pretty Simple

by JD Supra Perspectives on

While certainly not easy, data security and privacy compliance is actually pretty simple....more

Self-Sovereign Identity and Distributed Ledger Technology : Framing the Legal Issues

by Perkins Coie on

Purpose - Distributed ledger technology (“DLT”), including the use of blockchain technology, has been touted as a way to create and validate digital identities that serve many of the same purposes that physical forms of...more

Data Privacy and Security – What is the Difference?

by Michael Volkov on

The terms “Data Privacy and Security” are being thrown around a lot lately. Just recently, England’s health services and medical facilities were shut-down and the target of a ransom note (demanding, of course, payment in...more

FCPA Compliance Report-Episode 326, Paula Long On The Intersection Of Data Security And Compliance

by Thomas Fox on

In this episode I caught up with Paula Long, founder and CEO of DataGravity, Inc. at the recently concluded Collision 2017 Conference. Paula has worked in the data and information space for over 30 years and now helps...more

What Compliance Needs to Know About Data Privacy and Security

by Michael Volkov on

You don’t have to be a tech-savvy computer genius to address the basics of data privacy. Like many areas which compliance departments oversee, asking the right question and getting the right internal controls in place are the...more

"Cybersecurity Trends for Boards of Directors"

Cybersecurity has in recent years become an integral component of a board’s role in risk oversight, but directors often find themselves in unfamiliar territory when it comes to formulating policies and oversight processes...more

FCPA Compliance Report-Episode 304-Brad Davis on Data Security, Data Privacy and Information Governance

by Thomas Fox on

In this episode I visit with Brad Davis, founder and CEO of TechIttoMe, a data and information governance firm. It assists clients with data privacy, security and other facets of information government. Brad discusses...more

[Webinar] Cloud licensing and health care data: Know the risks, learn the solutions - July 13th, 12:00pm CT

by Thompson Coburn LLP on

As identity theft and malicious attacks against clinical providers increase, more and more health care data is stored in the digital cloud. The health care industry is required to take special precautions when licensing...more

Panama Papers Scandal Puts Third Party Risk in Focus

by NAVEX Global on

The Panama Papers scandal should serve as a wake-up call for every organization—and it should prompt compliance officers to closely scrutinize the third party vendors they do business with. ...more

Recent Government Cyber Alert and Draft Guide for Financial Institutions: Lessons for All Organizations

by Baker Donelson on

All organizations, including financial institutions, continue to face significant security threats across their wide ranging IT systems. Such organizations are particularly vulnerable if they cannot track networked devices...more

Recent Amendments to Security Breach Notification Laws Further Complicate Breach Notification for Employers

by Littler on

It is not a matter of "if" but "when" an employer will be required to notify employees of a security breach.  Forty-seven states require employers to notify employees when defined categories of personal information, including...more

Preview of NAVEX Global’s 2015 Ethics and Compliance Virtual Conference

by NAVEX Global on

As 2015 draws to a close (where did the time go?), the 2016 planning season is in full swing. You likely already have an idea of initiatives you’ll want to tackle, but taking your ethics and compliance program to the next...more

Focus on China - October 2015

by McDermott Will & Emery on

Welcome to the third issue of Focus on China Compliance for 2015. According to the FCPA Blog’s October 2015 Corporate Investigations List, China leads the countries reported to be involved in FCPA investigations with 29...more

Key Takeaways from the Consumer Protection Forum

by Holland & Knight LLP on

Holland & Knight and the Word of Mouth Marketing Association (WOMMA) hosted a half-day forum that featured government officials discussing hot-button issues in consumer protection regulation and enforcement. Speakers at the...more

5 Questions to Ensure Your Policies Keep Up With the Pace of Change

by NAVEX Global on

You hear a lot these days about the ways that individuals’ private data is collected and potentially exposed—to technology companies, employers, the government and so on. You hear less about the concern of many employers, who...more

Could a Vendor’s Lax Info Security Ruin Your Holiday Sales? Seven Preventative Steps for Retailers

by Perkins Coie on

Many of the largest retailer data security breaches have been caused or enabled by the acts or omissions of retailers’ vendors, such as the widely publicized incident at Target Corporation. Several such breaches occurred...more

Eye of the Storm: Be Prepared for Cross-Border Data Compliance Ahead of the January 1 Deadline

by Exterro, Inc. on

The eye at the center of a hurricane is the calmest part of the storm. Winds subside. Blue skies appear. A sense of relief falls over everyone because the immediate danger seems to have passed. But one of the biggest...more

79 Results
|
View per page
Page: of 4
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.