News & Analysis as of

Cybersecurity Electronic Data Transmissions

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Robinson+Cole Data Privacy + Security Insider

Election Results: New Data Privacy and Security Laws

Although the Presidential race is unconfirmed at the time of this writing, there are several data privacy and security laws to put on your radar following the election this week....more

Hogan Lovells

New PDPC guidelines on cloud services, data intermediaries, and access requests

Hogan Lovells on

As the issues surrounding data protection become increasingly complex, in recent years the advisory guidelines (Guidelines) issued by the Personal Data Protection Commission of Singapore (PDPC) have been invaluable in guiding...more

Hogan Lovells

A new model for obtaining data protection consents: unbundling the proposed amendments to China's Personal Information Security...

Hogan Lovells on

On 1 February, 2019, the National Information Security Standardization Technical Committee issued an amended version of the GB/T 35372-2017 Information Technology – Personal Information Security Specification for public...more

Orrick, Herrington & Sutcliffe LLP

Go West: Venture Financing and Business Expansion Projects in the United States - Practical Guidelines for German Technology...

As the U.S. and German tech ecosystems become more closely connected, raising capital in the U.S. market is becoming a strategic consideration for many fast-growing German tech companies. For some, establishing a presence in...more

Hogan Lovells

The UK Cyber Essentials Requirements for IT Infrastructure provides a window into GDPR expectations for data security requirements

Hogan Lovells on

The EU’s General Data Protection Regulation (GDPR), which went into effect in May 2018, requires companies to implement appropriate security measures when handling personal data....more

Hogan Lovells

Clinical trials: Digital technology for recruitment, consent, and data capture

Hogan Lovells on

The conduct of clinical trials still relies heavily on the use of paper documents. Of course, electronic case report forms (eCRF) have been commonly used for many years – the medical information on a patient that is...more

Snell & Wilmer

FTC’s “Stick With Security” #4: Store Sensitive Information Securely & Protect It During Transmission

Snell & Wilmer on

On August 18, 2017, the FTC released its fourth “Stick with Security” principle, which explained the importance of keeping confidential data only when needed, and securely storing the data when it must be kept. To that end,...more

Bradley Arant Boult Cummings LLP

Cybersecurity Steps Every Lawyer Should Consider

All lawyers face technology threats, ranging from the inconvenient to practice-threatening disasters. From unauthorized access, lawyers risk having confidential information stolen, destroyed or made inaccessible. Hackers...more

Morgan Lewis

China's Cybersecurity Law and Draft Implementation Rules

Morgan Lewis on

The law applies to all “network operators” and introduces cybersecurity mechanisms. On November 7, 2016, the Chinese government released a draft version of the Cybersecurity Law (CSL) that will govern China’s cyberspace...more

Carlton Fields

Are You Prepared for Disruption? New regulations, new challenges and opportunities [Expect Focus – Vol. II, July 2016]

Carlton Fields on

- Fed Takes First Steps Toward Setting Capital Requirements for Some Insurers - New Wave of COI Rate Increase Lawsuits Hits the Industry - STOLI Policies Cancelled, Insurers Retain Premium -...more

Butler Snow LLP

Data Security Breaches: Are you covered?

Butler Snow LLP on

Data security breaches can have a significant impact a company’s bottom line. While larger corporations may be able to sustain the financial hit, small to mid-size corporations can be significantly impacted from the financial...more

Carlton Fields

Laws Governing Data Security and Privacy – U.S. Jurisdictions at a Glance

Carlton Fields on

The below chart constitutes a summary of the laws of various jurisdictions that govern data breach notifications...more

12 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide