Technology Data Protection

News & Analysis as of

David Horrigan of kCura: eDiscovery Trends

This is the second of the 2017 Legaltech New York (LTNY) Thought Leader Interview series. eDiscovery Daily interviewed several thought leaders at LTNY (aka Legalweek) this year to get their observations regarding trends at...more

Artificial Intelligence: Transforming the Way We Create and Consume Content

Artificial intelligence (intelligence exhibited by machines; AI) is experiencing rapid growth, evident from last year’s record levels of investment in this industry. AI has also already taken centre stage this year by...more

Supreme Court Nominee Neil Gorsuch on Data Privacy

Last month, the President announced his nomination of Judge Neil M. Gorsuch—a federal appeals court judge—to the Supreme Court. Gorsuch must still go through Senate confirmation hearings before officially becoming the ninth...more

Know Where Your Student Data is Going!

As we move into the second half of the school year, we want to remind districts and charter schools of the importance of securing and protecting student data. Educators use and share student data in dynamic ways that improve...more

Maritime Cybersecurity Regulation on the Horizon

Over the past year, various institutions and organizations—both domestic and international—have shown an interest in moving the increasingly prevalent cybersecurity conversation offshore. Domestically, both Congress and...more

NIST Releases Draft NICE Cybersecurity Workforce Framework

We consistently comment about the importance of educating the next generation of students on cybersecurity. The earlier the better, as far as I am concerned-as early as the third grade. There is a dearth of cybersecurity...more

Federal and State Authorities Take First Steps Toward Regulating Blockchain, Mobile Banking and Digital Financial Services

Last week, federal and state lawmakers took significant steps toward specific regulations targeting digital financial technology, mobile banking and cybersecurity, signaling the possibility of wholesale changes to the legal...more

Gartner identifies future cyber security technologies to fight cyber crime

A recent Gartner report has identified what it believes to be the Top 10 Cyber Security Technologies for the future to assist businesses with combating cyber crime....more

[Event] 2015 Cybersecurity Seminar: Identifying and Mitigating Data Breaches and Related Liabilities - Oct. 29th, Richmond, VA

October is National Cyber Security Awareness Month! Please join Williams Mullen, Marsh and EY for an in-depth discussion on effective strategies for identifying and mitigating data breach and related liabilities. WHO...more

Litigation Alert: The CJEU's Decision on Safe Harbor and its Effects on US Technology Companies

The CJEU’s Decision on Safe Harbor and its Effects on US Technology Companies - On October 6, 2015, the Court of Justice of the European Union (“CJEU”), the European Union’s highest court, issued a groundbreaking...more

Internet of Things – What does it mean for business?

What is the Internet of Things? The 'Internet of Things' (IoT) is a catchphrase describing the increasing interconnectedness between smart devices and sensors facilitated through their connection to the internet. It's not a...more

That is SO last week - July 2015 #2

Last week, The New York Times’ The Upshot blog covered a topic that has been one of our top concerns for a while: how big data can discriminate. The post followed a Carnegie Mellon University study that reported, among many...more

RadioShack’s Consumer Data: A Highly Scrutinized Asset

Following the Texas Attorney General’s objection to the sale of RadioShack Corporation’s consumer data as an asset in its bankruptcy, 37 other state attorneys general and a large number of other consumer protection entities...more

German Parliament's IT-Security Act Covers Critical Infrastructure

On June 12, 2015, the German Parliament (Deutscher Bundestag) passed an Act to Improve the Security of Information Technology Systems ("IT-Security Act"). The new legislation requires operators of so-called critical...more

FINRA settles data breach enforcement action

The Financial Industry Regulatory Authority (FINRA) agreed to settle its enforcement action with Sterne Agee & Leach, Inc. (Sterne) this week for $225,000. The enforcement action followed the loss of an unencrypted laptop by...more

French Data Protection Authority Unveils Its Inspection Program for 2015

On May 25, 2015, the French data protection authority (CNIL) published its annual inspection program for 2015, unveiling its objectives and priorities for the year. This alert highlights the main priorities of the CNIL for...more

Cybersecurity: Integral to Overall Risk Management for Insurers and TPAs

Recent data breaches have brought cybersecurity to the attention of insurance companies, and serve as a reminder to third party administrators ("TPAs") that cybersecurity issues are a serious compliance and regulatory...more

DOJ Issues New Cyber-Incident Preparedness and Response Guidance

The Department of Justice (DOJ) released new guidance on cyber preparedness and incident response last week, becoming the latest federal agency to do so in recent months. Newly sworn-in Attorney General, Loretta Lynch, has...more

Update: Germany's Draft Bill on IT Security

On March 20, 2015, the revised bill to increase the security of IT systems (the "Draft Bill")was first read in the German Bundestag. As contemplated in the White & Case Technology Newsflash of August 2014, the overarching...more

FTC Announces Office of Technology Research and Investigation

This week the FTC Bureau of Consumer Protection announced a new office to bolster the technological expertise of the Bureau and the FTC regional offices handling law enforcement investigations. ...more

Is Privacy Dead?

If the Internet and social media have not already killed privacy, Big Data and the Internet of Things (IoT) are likely to finish the job. As 91 percent of American consumers agreed in a recent Pew Research Center survey,...more

Social Media: 10 Fundamental Questions All Businesses Should Consider About Their Online Presence

Twenty years ago, the social media world we now live in was the stuff of science fiction. Today, social media is a critical business tool creating unprecedented opportunities for direct consumer interaction, brand awareness,...more

2015 Trends: #9 Technology-enabled ethics and compliance is ready for takeoff

By every indication we are about to witness a dramatic leap in technology-enabled ethics and compliance. Tech Advancement in Key E&C Areas - Trends and our own client experiences are demonstrating that we are...more

Energy and information technology: An upcoming wedding where data is at the heart of power

Nowadays, the European energy world is facing a revolution. European utilities have underperformed the broader European equity market by 80 per cent since the start of 2009. They are all trying to transform themselves from...more

Privacy in the Cloud: A Legal Framework for Moving Personal Data to the Cloud

For many companies, the main question about cloud computing is no longer whether to move their data to the “cloud,” but how they can accomplish this transition. Cloud (or Internet-based on-demand) computing involves a shift...more

51 Results
|
View per page
Page: of 3
Cybersecurity

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×