News & Analysis as of

Sarbanes-Oxley Health Insurance Portability and Accountability Act (HIPAA)

J.S. Held

What is an Information Security Framework and Why Do I Need One?

J.S. Held on

An information security framework, when done properly, will allow any security leader to more intelligently manage their organization's cyber risk. The framework consists of a number of documents that clearly define the...more

Reveal

Data Compliance: What You Need to Know in 2023

Reveal on

Data plays a central role in the operations of nearly every industry today. Along with the increase in the volume of corporate data that exists, we’ve seen an increase in the number of laws and regulations protecting...more

Mintz - ML Strategies

Understanding the American Data Privacy and Protection Act

Mintz - ML Strategies on

On Friday, June 3, Representative Frank Pallone (D-NJ), Chairman of the House Energy & Commerce Committee, Representative Cathy McMorris Rodgers (R-WA), the committee’s Ranking Member, and Senator Roger Wicker (R-MS), Ranking...more

Reveal

You Need Only Two Letters Today to Keep Up with the “Alphabet Soup” of Compliance

Reveal on

Back in November, I wrote on this blog about Big Data being one of the challenges that is forcing technology to move more to the data sooner in the discovery process. One of the most notable fun facts that illustrate just how...more

Seyfarth Shaw LLP

ARB: No Protected Activity where Employee Inadvertently Informed Employer and Only “Hinted” at Filing Whistleblower Complaint

Seyfarth Shaw LLP on

Seyfarth Synopsis: The DOL’s ARB rejected an employee’s SOX retaliation claim where he inadvertently provided information to his employer and only “hinted” that he was filing a SOX-protected complaint. The ARB seems unwilling...more

WilmerHale

A Closer Look at Cybersecurity Legislation and Regulations in the US and Abroad - United States

WilmerHale on

Legal Framework - Summarise the main statutes and regulations that promote cybersecurity. Does your jurisdiction have dedicated cybersecurity laws? The United States generally addresses cybersecurity...more

Robinson+Cole Data Privacy + Security Insider

Security Frameworks 101: Which is Right for my Organization?

These days information security is on the minds of virtually all technology professionals and business executives alike. But how does an organization ensure that their security profile is adequate. It can certainly help to...more

Manatt, Phelps & Phillips, LLP

Corporate Investigations & White Collar Defense - August 2015

Are the Circuits A-Splitting? The Ninth Circuit Declines to Follow the Second Circuit's Insider Trading Decision in U.S. v. Newman - Why it matters: On July 6, 2015, the Ninth Circuit in U.S. v. Salman declined to...more

NAVEX

2015 Trends: #10 Cybersecurity: A Risk that Needs to be on Your Ethics and Compliance To-Do List

NAVEX on

The starting point for every ethics and compliance program must always be an analysis of the ethics and compliance risks faced by the organization. In that light, it’s important to listen to James Comey, Director, U.S....more

Holland & Knight LLP

Data Breach Legislative Debate Begins Today at the House Energy & Commerce Committee

Holland & Knight LLP on

On Tuesday, the House Energy & Commerce Subcommittee on Commerce, Manufacturing, and Trade held a hearing entitled "What are the Elements of Sound Data Breach Legislation?" This hearing was the first of the new Congress to...more

Jackson Walker

Enterprise Data Security For The Securities Lawyer

Jackson Walker on

Assuring cybersecurity has become a necessity for businesses across all industries. Cybercrime — with over $1 trillion in annual profits — is now the most lucrative illegal global business. Any business with computers and...more

11 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide