News & Analysis as of

Risk Mitigation Risk Assessment Data Protection

Association of Certified E-Discovery...

[Webinar] Uncovering E-Discovery Data Risks - How to Identify and Mitigate Hidden Threats Before It's Too Late - August 28th,...

Something keeping you up at night? It just might be the data risks hiding in your e-discovery process. Join us for an in-depth webinar on "Uncovering E-Discovery Data Risks: How to Identify and Mitigate Hidden Threats Before...more

NAVEX

Don't Be the Weakest Link – Your Team's Crucial Role in Cybersecurity

NAVEX on

Cybersecurity success depends on more than just technology. As we’ve seen in part one and part two of this series on cybersecurity risk, the costs of a cyber attack are high – and bad actors always look for the easiest entry...more

K2 Integrity

World Password Day: Security Through Long, Unique Passwords

K2 Integrity on

Today is World Password Day, a day for organizations to remind their employees of the importance of using strong passwords and practicing good password hygiene to protect personal and work accounts. Given the large number of...more

Health Care Compliance Association (HCCA)

‘An Unknown Individual Walked In’: Protecting Against Telehealth Risks Includes Non-IT Threats

The HHS Office for Civil Rights (OCR) and other government agencies aren’t just worried that providers understand—and mitigate—the privacy and security risks of telehealth. In fact, in 2022, the Government Accountability...more

Health Care Compliance Association (HCCA)

Artificial intelligence: Compliance considerations for provider organizations

Artificial intelligence (AI) is nothing new to the healthcare industry, as many organizations and clinicians have utilized such tools in some capacity for many years. Imaging-related AI to support radiologists is not...more

Latham & Watkins LLP

Erfahrungsbericht: Latham & Watkins plädiert als erste Anwaltskanzlei zu DSGVO-Geldbußen vor dem Europäischen Gerichtshof

Latham & Watkins LLP on

Der Europäische Gerichtshof (EuGH) wird bald darüber entscheiden, ob europäische Datenschutzbehörden künftig leichter Bußgelder nach Art. 83 DSGVO gegen Unternehmen verhängen können. Diese Entscheidung kann großen Einfluss...more

J.S. Held

Cyber Security & Business Interruption: Foundations for Prevention and Mitigation

J.S. Held on

The modern security ecosystem is diverse and ever-changing, a place where cyber risk is top of mind for leaders at all levels, and threats to information / data security and privacy evolve at the speed of the technical...more

Society of Corporate Compliance and Ethics...

[Event] 11th Annual European Compliance & Ethics Institute - March 20th - 22nd, Amsterdam, Netherlands

In-person is back! Join us in Amsterdam for the 2023 European Compliance & Ethics Institute! Strengthen your compliance and ethics program by attending our 11th annual European Compliance and Ethics Institute, 20-22 March...more

Epiq

Elevating Cyber Risk Analysis During M&A Due Diligence

Epiq on

Before a deal closes on a merger or acquisition, due diligence investigation will ensue to confirm goal alignment and identify any obstacles present. There are several integral components of this process such as identifying...more

BakerHostetler

DSIR Deeper Dive into the Data: Ransomware Front and Center

BakerHostetler on

There is no question that ransomware is here to stay. Thirty-seven percent of the matters we handled last year involved ransomware, compared to 27 percent of matters in 2020. ...more

Mitratech Holdings, Inc

What is Vendor Risk & Vendor Risk Management (VRM)?

Vendor risk management (VRM), or third-party risk management, is the management, monitoring, and evaluation of risks that result from third-party vendors and suppliers of products and services. It’s a crucial initiative...more

Hogan Lovells

Protecting the Workforce and Information in a Global Landscape: A Legal Review

Hogan Lovells on

Organizations around the world face substantial and increasing cybersecurity-related threats to operations, reputation, and the bottom line. Cyber risk profiles are changing, particularly in light of the increase in agile...more

Lighthouse

The Impact of Schrems II & Key Considerations for Companies Using M365: The Cloud Environment

Lighthouse on

In part one of this series, we described the state of the EU-US Privacy Shield and the mechanisms global companies have relied upon to transfer data from their multiple locations. In short, a recent decision – Schrems II –...more

Hinshaw & Culbertson - Insights for Insurers

Beyond Data Breach: Evaluating Coverage for Misuse of Information Claims

New and comprehensive privacy and cyber regulations continue to proliferate across the globe. These are not your father’s data breach notification laws. The scope of information included within these mandates has expanded...more

Hutchison PLLC

CCPA – What is it and does this apply to my organization?

Hutchison PLLC on

As many in the U.S. were ringing in the New Year on January 1, 2020, the long-anticipated California Consumer Privacy Act (CCPA) became effective. This statute’s main intent is to protect the privacy of California residents...more

Orrick, Herrington & Sutcliffe LLP

A Survival Guide for GDPR Enforcement Actions from a German Perspective – How to Assess and Mitigate Fines for GDPR Violations

Since the first enforcement actions have been initiated, some with significant fines, many companies may find themselves somewhat at a loss as they may not fully know how to assess the risks involved and how to react should...more

Foley Hoag LLP - Security, Privacy and the...

Is it weird not to have a privacy policy? (And other thoughts on privacy policy best practices.)

You probably are employed by an organization that has a website privacy policy. I am. That’s because most organizations process personal information through their websites in some way, such as through online forms that ask...more

Snell & Wilmer

Cybersecurity on Your Project: Why Not Follow National Security Strategy?

Snell & Wilmer on

In its recent Cybersecurity Strategy, the U.S. Department of Homeland Security (DHS) defined “cyberspace” as “the independent network of information technology infrastructure, including the Internet, telecommunications...more

Bass, Berry & Sims PLC

GDPR Top 5 Actions You Should Take NOW

Bass, Berry & Sims PLC on

The EU’s General Data Protection Regulation (GDPR) goes into effect on May 25th. As most organizations are aware, the GDPR applies not only to EU businesses but also many companies in the U.S. While the deadline is quickly...more

Holland & Knight LLP

Congress Continues Push on Medical Device Cybersecurity Mandates - FDA Issues Medical Device Safety Action Plan; DHS Continues to...

Holland & Knight LLP on

Cybersecurity risks to the health and medical device sector continue to be front and center both in Congress and the executive branch, with increasing risks coming from nation states, nonstate actors and other attackers. The...more

McGuireWoods LLP

HIPAA in Due Diligence (Part III): Risk Mitigation Strategies

McGuireWoods LLP on

Health Information Highlight - Welcome back to our three-part series examining ways to efficiently identify, address and mitigate gaps in HIPAA compliance in transaction diligence. In Part I, we discussed four key...more

Orrick - Trade Secrets Group

Pooley’s Corner: How to Recruit and Hire While Avoiding Data Contamination

When we think about trade secrets, we usually focus on keeping our own data safe. But an even bigger risk comes from hiring employees who can infect our systems with confidential information from a competitor. Companies often...more

WilmerHale

SEC Issues Cybersecurity Examination Risk Alert

WilmerHale on

On September 15, the Securities and Exchange Commission’s (SEC) Office of Compliance Inspections and Examinations (OCIE) issued a Risk Alert re-emphasizing the careful scrutiny it will give to the data security practices of...more

Foley & Lardner LLP

Cybersecurity Update - July 2015

Foley & Lardner LLP on

Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more

Professional Liability Underwriting Society (...

Technology in Healthcare

From the 2015 PLUS Medical PL Symposium session “Technology in Healthcare: EHRs & PHI,” moderator Patricia Marzella-Graubert (Swiss Re American Holdings Corporation) and panelist Alexander Grijalva (New York Presbyterian...more

32 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide