News & Analysis as of

Personally Identifiable Information Information Security

HaystackID

[Webinar] From Breach to Insight: Incident Response & PII Recovery - May 29th, 12:00 pm EDT

HaystackID on

With escalating cyber risks and heightened regulatory scrutiny, every minute after a data breach is crucial. Sophisticated cybercriminals relentlessly target your organization’s most valuable asset: personally identifiable...more

McGlinchey Stafford

[Webinar] Deep Dive into Privacy: Think You Are Not Privacy Counsel? Think Again. A Webinar on What You Need to Know. - February...

McGlinchey Stafford on

The next installment in McGlinchey’s Deep Dive Series covering all things privacy is a webinar featuring attorneys from McGlinchey’s Financial Institutions Compliance, Financial Services Litigation, and Insurance Regulatory...more

Partridge Snow & Hahn LLP

Non-Profit Organizations Can Reduce Risks by Addressing Data Privacy Concerns in Advance

With the threat of cyber-attacks making the news, it is a good time for all non-profit organizations to review their policies and procedures with respect to data privacy. Many non-profit organizations are particularly...more

Bowditch & Dewey

Massachusetts Moving Closer to Comprehensive Data Privacy Protection

Bowditch & Dewey on

The Commonwealth of Massachusetts is moving closer to passing consumer data privacy protection legislation with bipartisan support. The Joint Committee on Advanced Information Technology, the Internet and Cybersecurity...more

Goodwin

China is Entering a New Era in Data Protections

Goodwin on

On November 1, 2021, the Personal Information Protection Law of the People’s Republic of China (the “PRC”) (the “Personal Information Protection Law”) went into effect, two months after the Data Security Law of the PRC (the...more

Health Care Compliance Association (HCCA)

Report on Patient Privacy Volume 22, Number 1. Privacy Briefs: January 2022

Report on Patient Privacy 22, no. 1 (January, 2022) - New Jersey issued its third settlement in three months on state-level health care privacy and security laws, announcing that three cancer care providers would adopt new...more

Mayer Brown Free Writings + Perspectives

US Securities and Exchange Commission Increases Focus on Cybersecurity

This past summer’s string of cyber enforcement actions signals that cybersecurity has become a top priority for the US Securities and Exchange Commission (“SEC”). This focus is consistent with the SEC’s Division of...more

Reveal

Healthcare Organizations Must Deal with their Shadow Information Problem

Reveal on

A myopic focus on protecting EMR (Electronic Medical Records) systems has left healthcare organizations open to shadow information risk. In a world where hackers and ransomware criminals are regularly compromising healthcare...more

Goodwin

SEC Makes Cybersecurity Top Priority; Sanctions Firms for Cybersecurity Failures

Goodwin on

There is little doubt that the U.S. Securities and Exchange Commission is making cybersecurity a top priority. SEC Chair Gary Gensler told a Senate committee on Tuesday, September 14, 2021 that the agency is developing a...more

Society of Corporate Compliance and Ethics...

[Webinar] Effective Use of Privacy Impact Assessments - September 13th, 12:00 pm - 1:30 pm CDT

Learning Objectives: - What is a PIA and a DPIA? - Who should instigate assessments? - How and when to use assessments? - The relationship between assessments and privacy by design, and legal grounds for processing...more

Oberheiden P.C.

Are You a Financial Institution? GLBA Law & Compliance

Oberheiden P.C. on

The Gramm-Leach-Bliley Act (GLBA) is a federal law that establishes various legal requirements for companies that qualify as “financial institutions” under the Act. The GLBA’s definition of a “financial institution” is...more

Fisher Phillips

Conducting Remote Workplace Investigations: Challenges And Top 10 Practical Solutions

Fisher Phillips on

As many workplaces have shifted to remote work arrangements, human resources personnel, in-house lawyers, and other workplace investigators are conducting more remote workplace investigations. Remote investigations may...more

Husch Blackwell LLP

[Webinar] Privacy Law Update - CCPA 2.0: Analyzing the California Privacy Rights Act - November 10th, 12:00 pm - 1:30 pm CT

Husch Blackwell LLP on

California voters just approved the California Privacy Rights Act (CPRA), which will significantly amend the California Consumer Privacy Act (CCPA). Join us for an in-depth look at the CPRA and how it will change privacy law...more

Akin Gump Strauss Hauer & Feld LLP

Coalition of African Nations to Coordinate Data Protection Framework

A coalition of African nations have developed a data protection framework with the goal of centralizing data protection laws and the digital economy across Africa. Currently, five countries, including Nigeria, are testing the...more

Akin Gump Strauss Hauer & Feld LLP

NYAG Reaches Settlement with Dunkin’ Over Cyberattacks

On September 15, 2020, the New York Attorney General (NYAG) reached a Consent and Stipulation Agreement (the “Agreement”) with Dunkin’ Brand’s Inc. a year after filing a lawsuit over the company’s response to cyberattacks in...more

Robinson+Cole Data Privacy + Security Insider

Tyler Technologies Victim of Cyber-Attack

As one of the largest information technology service providers to local governments, the cyber-attack on Tyler Technologies (Tyler) in Plano, Texas is a sobering reminder of how a cyber-attack on a third-party vendor can put...more

Partridge Snow & Hahn LLP

Bringing Your Business Online: Written Information Security Programs (WISPs)

The current COVID-19 pandemic has forced many businesses online in order to survive. In many cases, businesses had no plans to be online. Others were forced to move online more quickly than planned. In order to assist these...more

Ballard Spahr LLP

Planning for the Worst: Privacy, Info Sec, and Bankruptcy

Ballard Spahr LLP on

With the ongoing covid crisis leaving businesses of all sizes concerned about the short and medium term future, the intimidating task of considering a liquidation or restructuring is inevitably starting to become a reality. ...more

Association of Certified E-Discovery...

Keep Calm and Carry On: 5 Data Security Do’s and Don’ts for Everyone

Cyber criminals see opportunity in the pandemic. Some exploit security vulnerabilities in remote working. Others prey on people’s fears by crafting phishing emails and malware-infected websites purportedly about the...more

Fisher Phillips

The Cybersecurity Threat of COVID-19

Fisher Phillips on

As people across the world react to the rapid spread of COVID-19, a new threat is emerging; individuals and employers face a risk from hackers trying to take advantage of the demand for information. Hackers have begun using...more

Robinson+Cole Data Privacy + Security Insider

Cyber Criminals Using Coronavirus Concern to Assist with Intrusions

Concern over the spreading coronavirus from China is legitimate and real. The World Health Organization (WHO) has declared the coronavirus a global health emergency, and the United States and other countries are limiting...more

McDermott Will & Emery

[Event] CCPA Compliance: An Interactive Workshop - Multiple Dates/Locations, February 11th - 24th

McDermott Will & Emery on

Effective as of January 1, 2020, the California Consumer Privacy Act (CCPA) gives broad rights to people on their personal data in the custody of companies. This focus on data rights significantly raises the compliance burden...more

McDermott Will & Emery

[Event] CCPA Compliance: An Interactive Workshop - Multiple Dates/Locations, Jan. 22nd - 30th

McDermott Will & Emery on

Effective as of January 1, 2020, the California Consumer Privacy Act (CCPA) gives broad rights to people on their personal data in the custody of companies. This focus on data rights significantly raises the compliance burden...more

Brooks Pierce

Sure, Hindsight Is 20/20 But These 2020 Cybersecurity New Year’s Resolutions Will Aid In Securing Your Business

Brooks Pierce on

In this day, data is often one of the most valuable assets companies have and it needs to be protected as such. Guarding data has become crucial for every business, no matter the size and industry. In the first half of 2019,...more

Faegre Drinker Biddle & Reath LLP

ED Requires Higher Education Audits to Review GLBA Data Security Compliance

As discussed in a previous DBR on Data post, the U.S. Department of Education (“ED”) in recent years has repeatedly emphasized the importance of higher education institutions taking all appropriate measures to secure and...more

47 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide