News & Analysis as of

Compliance Data Security

Compliance programs typically refer to formalized institutional procedures within corporations and organizations to detect, prevent and respond to indvidual and widespread instances of regulatory violations. ... more +
Compliance programs typically refer to formalized institutional procedures within corporations and organizations to detect, prevent and respond to indvidual and widespread instances of regulatory violations.  In response to many corporate scandals evidencing rampant unethical business practices, many nations, including the United States, began passing strict regulatory frameworks aimed at curbing these abuses. Notable pieces of legislation in this area include the U.S. Foreign Corrupt Practices Act (FCPA), Sarbanes-Oxley (SOX), and the U.K. Bribery Act, to name a few. The foregoing statutes and the severe penalties often associated with them form the basis of many modern institutional compliance programs. less -
Ankura

Expert Insights on Resolving Common Cloud Computing Disputes

Ankura on

In today's business landscape, cloud computing is an essential component for scalability, cost-efficiency, and operational agility. However, as dependence on cloud services grows, disputes are becoming increasingly frequent....more

Good2bSocial

6 Pitfalls Law Firms Should Avoid When Choosing New Marketing Technology Solutions

Good2bSocial on

If you read our past post on what makes up a modern marketing technology stack, you know that thousands of platforms are available to help with virtually every facet of running your law firm’s day-to-day marketing. Moreover,...more

WilmerHale

WilmerHale’s Guide to the EU Data Act - September 2024

WilmerHale on

Exactly one year from now, on September 12, 2025, the EU Data Act will enter into application. This new regulation provides harmonized rules on data access, switching cloud providers, and interoperability requirements across...more

Womble Bond Dickinson

Upcoming Deadline for PCI DSS 4.0.1 Implementation

Womble Bond Dickinson on

A critical deadline of March 31, 2025 is upcoming for the full implementation of the new requirements contained in the Payment Card Industry Data Security Standard (PCI DSS) version 4.0....more

Health Care Compliance Association (HCCA)

[Event] Healthcare Privacy Compliance Academy - December 9th - 12th, San Diego, CA

HCCA's Healthcare Privacy Compliance Academy is a three-and-a-half-day interactive education program with a focus on the vast body of privacy laws and regulations in place to help you protect PHI and other critical data. Our...more

Society of Corporate Compliance and Ethics...

[Virtual Event] Compliance & Ethics Essentials Workshop - December 2nd - 5th, 8:00 am - 5:00 pm CT

Learn the key principles of compliance - no travel required! If you’re new to or have minimal experience in compliance management don’t miss this opportunity to build the foundational knowledge you need! SCCE’s four-day...more

Skadden, Arps, Slate, Meagher & Flom LLP

DOJ Enters First Intervention in Cybersecurity Qui Tam

The U.S. government’s recent complaint in a relator-filed case under the False Claims Act (FCA): - Marks the first FCA suit in which the Department of Justice (DOJ) has intervened since launching its ongoing Civil...more

Dorsey & Whitney LLP

DOJ on Campus: DOJ’s First Intervention in False Claims Act Case Alleging University Knowingly Failed to Meet Contractual...

Dorsey & Whitney LLP on

Cybersecurity requirements for federal contractors and grantees continue to proliferate—and those requirements do not just come with contractual risk. Increasingly, the United States government is leveraging enforcement...more

BakerHostetler

Data Security, Commercial Email and Employee Reviews Walk into a Bar...

BakerHostetler on

Sorry folks, there is no punchline here, but there are bottom lines from a settlement the Federal Trade Commission (FTC) announced last week. We discuss three today: (1) the FTC continues to mount broad investigations and...more

Dechert LLP

Read All About It: CFIUS Publishes Enforcement Information

Dechert LLP on

After over a year of preview, the Committee on Foreign Investment in the United States (“CFIUS” or the “Committee”) has finally published information on its most recent enforcement actions. The actions were announced on...more

DLA Piper

CHINA: Mandatory Data Protection Compliance (Self) Audits on Their Way

DLA Piper on

The Personal Information Protection Law (“PIPL“) requires a data controller to conduct compliance audits of its personal data processing activities on a regular basis (“Self-supervision Audits“). Apart from such...more

Hinch Newman LLP

FTC Drops the Hammer on Security Camera Firm Over Charges it Failed to Secure Videos and Personal Data, and that it Violated...

Hinch Newman LLP on

On August 30, 2024, the Federal Trade Commission announced that the Department of Justice filed a complaint upon notification and referral from the FTC against a surveillance camera company that allegedly failed to provide...more

Health Care Compliance Association (HCCA)

[Event] Healthcare Privacy Compliance Academy - November 18th - 21st, Boston, MA

HCCA's Healthcare Privacy Compliance Academy is a three-and-a-half-day interactive education program with a focus on the vast body of privacy laws and regulations in place to help you protect PHI and other critical data. Our...more

Mitratech Holdings, Inc

Switching Background Screening Vendors: 6 Tips To Make The Change

Choosing the right background screening vendor is a crucial step for any organization. The stakes are high, and getting it wrong can lead to costly mistakes or legal troubles. If you’re considering making a switch, you’re not...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Adopting Generative AI? Key Contract Considerations for Healthy Due Diligence

As generative AI continues to be a hot topic in board rooms and an unavoidable reality on the front lines of business, leaders must make informed decisions when choosing AI vendors. The integration of AI into your operations...more

Osano

The Privacy Insider Podcast Episode 4: Don't Be Evil: In the Hot Seat of Data Privacy, Part 1

Osano on

In this episode of The Privacy Insider Podcast, Keith Enright, the outgoing Chief Privacy Officer at Google, joins host Arlo Gilbert to share what it’s like to be at the privacy helm of one of the world’s most influential–and...more

Mitratech Holdings, Inc

Immigration Case Management Software: Your Complete Guide

Juggling paperwork and navigating complex immigration case management and regulations difficult and, at times, can cause unnecessary risk. For any immigration law firm, technology can make all the difference in streamlining...more

Smith Debnam Narron Drake Saintsing & Myers,...

Utilizing Artificial Intelligence in Employment-Related Matters: Recent Developments and Best Practices

Recently, the intersection of artificial intelligence (AI) and employment law has become a focal point for legislators, regulators, and employers alike. As AI technologies continue to reshape hiring practices and workplace...more

Legal Internet Solutions Inc.

Gen AI and Attorney Ethics: A State-by-State Roundup

Be cautious, be curious, be vigilant, and be brave. Those were the words of the New York State Bar Association’s Task Force on Artificial Intelligence. It is good advice. GenAI is here and lawyers need to understand its...more

Conn Kavanaugh

Navigating the Artificial Intelligence Landscape: What Businesses Need to Know

Conn Kavanaugh on

Artificial Intelligence (“AI”) generated a tremendous amount of excitement in 2023 as businesses rushed to build use cases and deploy AI tools throughout their organizations. AI has evolved from a futuristic concept into a...more

Mayer Brown

New EU Cyber Rules: Implementation of NIS2 in the EU Member States

Mayer Brown on

The Network and Information Security 2 Directive (EU) 2022/2555 ("NIS2") entered into force on 16 January 2023. NIS2 sets cyber rules for organizations whose services are considered essential or important for maintaining...more

Osano

Navigating the Regulation Jungle: How to Be Compliant, Work Efficiently, and Stay Sane

Osano on

Maintaining compliance is your job. But sometimes that job feels like a slog through the deepest jungle. More than 130 countries have some form of data privacy and protection law on the books. At the same time, 63% of...more

BCLP

Hong Kong Unveils Proposals for First Cybersecurity Law

BCLP on

The Hong Kong Government recently submitted its proposed legislative framework to enhance protection of computer systems of critical infrastructure (“Proposal”) to the Legislative Council (“LegCo”) Panel on Security for...more

Foley & Lardner LLP

Learn About Data Privacy and How to Navigate the Information Security Regulatory Landscape

Foley & Lardner LLP on

Insights for this month’s article are provided by ARDA members Gregory Szewczyk, partner at Ballard Spahr Practice Leader of the firm’s Privacy and Data Security Group, and Aaron Tantleff, partner in Foley & Lardner’s...more

Mitratech Holdings, Inc

Achieving SOC 2 Compliance

A Comprehensive Guide to Ensuring Data Security and Trust. 76% of users believe organizations must do more to protect their data. In an effort to lower this number and increase safety measures when it comes to customer...more

478 Results
 / 
View per page
Page: of 20

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide