News & Analysis as of

Compliance Data Security

Compliance programs typically refer to formalized institutional procedures within corporations and organizations to detect, prevent and respond to indvidual and widespread instances of regulatory... more +
Compliance programs typically refer to formalized institutional procedures within corporations and organizations to detect, prevent and respond to indvidual and widespread instances of regulatory violations.  In response to many corporate scandals evidencing rampant unethical business practices, many nations, including the United States, began passing strict regulatory frameworks aimed at curbing these abuses. Notable pieces of legislation in this area include the U.S. Foreign Corrupt Practices Act (FCPA), Sarbanes-Oxley (SOX), and the U.K. Bribery Act, to name a few. The foregoing statutes and the severe penalties often associated with them form the basis of many modern institutional compliance programs. less -

The Cyberspace Administration of China Released the First Batch of Network Products that Are Subject to Security Review

by Dechert LLP on

The Cyberspace Administration of China ("CAC") recently released the first batch of "Catalog" - a listing of the specific network products that have been identified for review under China's New Cybersecurity Law. This article...more

Hogan Lovells China Desk Brochure

by Hogan Lovells on

A bridge between China and Europe, the Middle East and Africa - The Hogan Lovells China Desk seeks to help you benefit from the opportunities arising from the evergrowing economic ties between the EMEA region and China....more

Over-Analyzed and Under-Protected: Cybersecurity Compliance is Actually Pretty Simple

by JD Supra Perspectives on

While certainly not easy, data security and privacy compliance is actually pretty simple....more

Self-Sovereign Identity and Distributed Ledger Technology : Framing the Legal Issues

by Perkins Coie on

Purpose - Distributed ledger technology (“DLT”), including the use of blockchain technology, has been touted as a way to create and validate digital identities that serve many of the same purposes that physical forms of...more

Data Privacy and Security – What is the Difference?

by Michael Volkov on

The terms “Data Privacy and Security” are being thrown around a lot lately. Just recently, England’s health services and medical facilities were shut-down and the target of a ransom note (demanding, of course, payment in...more

FCPA Compliance Report-Episode 326, Paula Long On The Intersection Of Data Security And Compliance

by Thomas Fox on

In this episode I caught up with Paula Long, founder and CEO of DataGravity, Inc. at the recently concluded Collision 2017 Conference. Paula has worked in the data and information space for over 30 years and now helps...more

What Compliance Needs to Know About Data Privacy and Security

by Michael Volkov on

You don’t have to be a tech-savvy computer genius to address the basics of data privacy. Like many areas which compliance departments oversee, asking the right question and getting the right internal controls in place are the...more

"Cybersecurity Trends for Boards of Directors"

Cybersecurity has in recent years become an integral component of a board’s role in risk oversight, but directors often find themselves in unfamiliar territory when it comes to formulating policies and oversight processes...more

FCPA Compliance Report-Episode 304-Brad Davis on Data Security, Data Privacy and Information Governance

by Thomas Fox on

In this episode I visit with Brad Davis, founder and CEO of TechIttoMe, a data and information governance firm. It assists clients with data privacy, security and other facets of information government. Brad discusses...more

[Webinar] Cloud licensing and health care data: Know the risks, learn the solutions - July 13th, 12:00pm CT

by Thompson Coburn LLP on

As identity theft and malicious attacks against clinical providers increase, more and more health care data is stored in the digital cloud. The health care industry is required to take special precautions when licensing...more

Panama Papers Scandal Puts Third Party Risk in Focus

by NAVEX Global on

The Panama Papers scandal should serve as a wake-up call for every organization—and it should prompt compliance officers to closely scrutinize the third party vendors they do business with. ...more

Recent Government Cyber Alert and Draft Guide for Financial Institutions: Lessons for All Organizations

by Baker Donelson on

All organizations, including financial institutions, continue to face significant security threats across their wide ranging IT systems. Such organizations are particularly vulnerable if they cannot track networked devices...more

Recent Amendments to Security Breach Notification Laws Further Complicate Breach Notification for Employers

by Littler on

It is not a matter of "if" but "when" an employer will be required to notify employees of a security breach.  Forty-seven states require employers to notify employees when defined categories of personal information, including...more

Preview of NAVEX Global’s 2015 Ethics and Compliance Virtual Conference

by NAVEX Global on

As 2015 draws to a close (where did the time go?), the 2016 planning season is in full swing. You likely already have an idea of initiatives you’ll want to tackle, but taking your ethics and compliance program to the next...more

Focus on China - October 2015

by McDermott Will & Emery on

Welcome to the third issue of Focus on China Compliance for 2015. According to the FCPA Blog’s October 2015 Corporate Investigations List, China leads the countries reported to be involved in FCPA investigations with 29...more

Key Takeaways from the Consumer Protection Forum

by Holland & Knight LLP on

Holland & Knight and the Word of Mouth Marketing Association (WOMMA) hosted a half-day forum that featured government officials discussing hot-button issues in consumer protection regulation and enforcement. Speakers at the...more

5 Questions to Ensure Your Policies Keep Up With the Pace of Change

by NAVEX Global on

You hear a lot these days about the ways that individuals’ private data is collected and potentially exposed—to technology companies, employers, the government and so on. You hear less about the concern of many employers, who...more

Could a Vendor’s Lax Info Security Ruin Your Holiday Sales? Seven Preventative Steps for Retailers

by Perkins Coie on

Many of the largest retailer data security breaches have been caused or enabled by the acts or omissions of retailers’ vendors, such as the widely publicized incident at Target Corporation. Several such breaches occurred...more

Eye of the Storm: Be Prepared for Cross-Border Data Compliance Ahead of the January 1 Deadline

by Exterro, Inc. on

The eye at the center of a hurricane is the calmest part of the storm. Winds subside. Blue skies appear. A sense of relief falls over everyone because the immediate danger seems to have passed. But one of the biggest...more

Wrapping Paper Series Updates

by Perkins Coie on

2015 - The Price of Customer Loyalty: Rewards Programs and Sales and Use Tax Issues - 09.21.2015 - Retailers and other businesses use loyalty and rewards programs to draw in customers throughout the year. However,...more

[Webinar] Managing Risk in the Era of Cyber Insecurity - Oct. 27th, 1:00 CST

by Robins Kaplan LLP on

Join privacy and data security attorney Richard Martinez for this informative session that will break down the details of the 50 leading enforcement actions taken by the FTC to regulate data privacy and cyber security. By...more

Alphabet Soup and Data Security

In the span of two days, mobile device users learned of two data breaches that could compromise their personal data. In one, Experian (a credit reporting agency) reported that it was hacked, potentially putting 15 million...more

OCR portal designed for medical mobile app developers

The Office for Civil Rights (OCR) of the Department of Health and Human Services has launched a web based portal so medical mobile app developers can ask their “burning” questions about HIPAA compliance....more

Mainbrace: October 2015, No. 4

by Blank Rome LLP on

As with the world economy, the shipping markets are currently experiencing a major bout of volatility. The wide range of matters we are handling in our maritime law practice certainly reflects the current swings the shipping...more

Privacy, Security, Risk: What You Missed At IAPP Conference

by Orrick - Trust Anchor on

Earlier this month, privacy and security professionals from around the globe gathered for “Privacy. Security. Risk. 2015”—the second joint conference between the International Association of Privacy Professionals and the...more

73 Results
|
View per page
Page: of 3
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.