News & Analysis as of

Cybersecurity Data Protection

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Foley & Lardner LLP

Cybersecurity in the Age of Industry 4.0 - Part 2

Foley & Lardner LLP on

This is the second article in our two-part series on Cybersecurity in the Age of Industry 4.0, focusing on the legal implications and potential liabilities manufacturers face from cyberattacks, as well as practical...more

Wiley Rein LLP

Athletes, Arenas, and Cyberattacks: The Evolving Landscape of Cybersecurity in Sports

Wiley Rein LLP on

As cybersecurity threats continue to evolve, the sports industry faces unique challenges in safeguarding its data, athletes, and events. During a recent panel discussion at the Aspen Cyber Summit, Reynold Hoover, CEO of the...more

Cozen O'Connor

PA AG Launches Online Portal for Data Breach Reporting

Cozen O'Connor on

Pennsylvania AG Michelle Henry announced the launch of an online portal to report data breaches ahead of the effective date of recent amendments to Pennsylvania’s Breach of Personal Information Notification Act (BPINA)....more

Osano

All About the Rhode Island Data Transparency and Privacy Protection Act (RIDTPPA)

Osano on

Starting January 1, 2026, businesses operating in Rhode Island will need to comply with the Rhode Island Data Transparency and Privacy Protection Act, a mouthful of a law abbreviated as RIDTPPA. (Not exactly catchy, is it?)...more

Orrick, Herrington & Sutcliffe LLP

California’s CPPA issues advisory on “dark patterns”

On September 4, the California Privacy Protection Agency (“CPPA”) issued an enforcement advisory warning businesses against using “dark patterns” in their user interfaces. “Dark patterns” are choices a company makes regarding...more

Woodruff Sawyer

Healthcare’s Ever-Evolving Privacy Landscape: Litigation, Regulation, and the Perpetual Data Breach Risk

Woodruff Sawyer on

This webinar focuses on the privacy, security, regulatory, and litigation landscape that the healthcare sector is facing in in the privacy and cybersecurity arena. Leveraging Polsinelli’s experience working with healthcare...more

A&O Shearman

"Much ado about nothing": The small yet significant steps in Australian Privacy Reform

A&O Shearman on

After nearly five years of review, the first tranche of amendments to Australia’s Privacy Act has landed (Privacy and Other Legislation Amendment Bill 2024 (Cth) (Bill)). The Bill introduces 23 of the 25 legislative proposals...more

Osano

When AI Meets PI: Assessing and Governing AI from a Privacy Perspective

Osano on

No doubt about it, artificial intelligence is here to stay. We are getting past the hype and starting to see how organizations are adopting AI. Even cautious groups who have taken a "wait and see" approach are beginning to...more

Sheppard Mullin Richter & Hampton LLP

The CFPB Continues to Reshape Consumer Protection in the Digital Arena 

On August 28, the CFPB issued a Consumer Advisory warning that it believes video game companies are targeting children for monetary gain. With 45.7 million U.S. children engaged in video gameplay, the agency is concerned...more

Miller Nash LLP

The State of State Privacy Laws: What Businesses Need to Know (2024 Edition)

Miller Nash LLP on

Summer days are over and it’s time to hit the books. State legislatures were just as busy in 2024 as they were in 2023 making up for the U.S. Congress’s inability to pass a comprehensive privacy law....more

Bond Schoeneck & King PLLC

Data Privacy and Security Concerns for Businesses in the Hospitality and Tourism Markets

Hospitality and tourism is a broad and varied industry that can encompass hotels, restaurants, bars, casinos, theme parks, wineries, breweries, distilleries and more. While these businesses all have very different methods of...more

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part III - Digital Forensics in your Incident Response Plan - September 19th, 1:00 pm - 2:00 pm...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more

Seyfarth Shaw LLP

Careful Data Governance Is a Must Amid Enforcement Focus

Seyfarth Shaw LLP on

Corporations face unprecedented challenges in safeguarding sensitive data and mitigating privacy risks in an era marked by the rapid proliferation of Internet of Things, or IoT, devices....more

Morgan Lewis

Saudi Arabia Personal Data Protection Law: Transition Period Ends September 14

Morgan Lewis on

The one-year transition period granted to bring businesses’ activities into compliance with the Personal Data Protection Law of the Kingdom of Saudi Arabia is about to end on September 14, 2024. Given the law’s...more

Dechert LLP

Dechert Cyber Bits - Issue 61

Dechert LLP on

X Agrees to Stop Processing EU Data to Train its Grok AI - Ireland’s Data Protection Commission (“DPC”) recently filed an urgent High Court application against X (formerly Twitter) for using the personal data of European...more

Bennett Jones LLP

Six Ways An Organization Can Benefit from an Internal Generative AI Use Policy

Bennett Jones LLP on

Generative Artificial Intelligence (GenAI) tools can be incredibly beneficial for businesses, enhancing productivity by streamlining administrative tasks, reducing redundancy, automating processes and improving data analysis....more

Association of Certified E-Discovery...

[Webinar] Digital Forensics in your Incident Response Plan - September 26th, 10:00 am PDT

Organizations face increasingly sophisticated threats that can compromise data and disrupt business operations. This presentation will explore the role that digital forensics plays in an effective incident response plan using...more

Troutman Pepper

SEC Cybersecurity Incidents Disclosures: Materiality, Decryptors, and Ransom Payments - Dear Mary – Incidents + Investigations...

Troutman Pepper on

I work for a public company that recently experienced a ransomware attack. Fortunately, we were able to restore our business operations quickly by obtaining a decryption key from the threat actor. Given that we managed to get...more

J.S. Held

Strategies to Avoid Cyber Insurance Claim Challenges: Part I

J.S. Held on

Cyber risk is now a normal part of our personal and professional lives. When companies suffer a cyber incident, they often look to their insurance policy for coverage to help mitigate the financial exposure. Additional...more

A&O Shearman

Cyber-attack victim obtains injunction to prevent publication of stolen data

A&O Shearman on

Following a high-profile cyber-attack earlier in the year which impacted the medical data of NHS patients, the English High Court granted Synnovis an interim injunction which prevents the publication of the stolen data. This...more

Hogan Lovells

What is quantum computing and what’s all the fuss about it?

Hogan Lovells on

Why is there so much hype around quantum computing? What are the main threats that this technology will bring? And what opportunities can be harnessed from it? In this article, we share our key takeaways from our recent...more

Woodruff Sawyer

How to Hire a CISO as Scrutiny Intensifies

Woodruff Sawyer on

The role of the chief information security officer (CISO) in 2024  is evolving. With budgetary limitations, an increasingly complex threat environment, generative artificial intelligence (AI) tools, new regulatory mandates, a...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, V 5, Issue 7, August 2024

Welcome to our seventh 2024 issue of Decoded - our technology law insights e-newsletter. We have a few events we want to pass along to those interested in technology, but also other areas of law and business. ...more

J.S. Held

Benefits of a vCISO in the Age of AI-Driven Cyberattacks

J.S. Held on

Cyberattacks powered by artificial intelligence have become more sophisticated as bad actors utilize machine learning to analyze vulnerabilities, automate exploits, and outpace traditional security measures. Through the use...more

Hogan Lovells

The Protection of Critical Infrastructure (Computer System) Bill: Hong Kong’s first specific cybersecurity legislation

Hogan Lovells on

In late June 2024, the Security Bureau of the Hong Kong SAR Government (the “Government”) proposed the first specific cybersecurity legislation in Hong Kong, tentatively entitled the Protection of Critical Infrastructure...more

8,483 Results
 / 
View per page
Page: of 340

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide