Latest Posts › Data Privacy

Share:

State Privacy Laws Differ; One Comprehensive Privacy Policy May Be Best

In recent years, several states have passed comprehensive privacy laws regulating how businesses must handle personal information. California, Colorado, and Virginia are among the states leading this charge. While each...more

‘Shields Up’ on Cybersecurity in Wake of Ukraine Conflict

Fears of cybersecurity attacks are mounting in the wake of the Russian invasion of Ukraine. From the war itself, a number of malware variants have been created and are circulating on the internet....more

Recent NYSED Decision Underscores Need for School Districts to Protect Data Privacy

School districts must consider the sanctity and privacy of data they maintain, as a recent decision underscores from the New York State Education Department’s Office of the Chief Privacy Officer. This alert explains the...more

Meeting the Changing Needs of Clients: Why We Started a SaaS Company [Audio]

Technology provides law firms with enormous opportunities to improve client service – in part, by streamlining and automating labor-intensive tasks in a way that frees attorneys to focus on a client’s most-pressing...more

Education Data Privacy and Security Laws: Best Practices for School Districts [Audio]

As if this fall weren’t hectic enough, school districts now need to prioritize compliance with a critical new regulation expanding New York state’s Education Law 2D. In effect since October 1, regulation Part 121 places new...more

COVID-19’s Impact on Cybersecurity – Don’t Let Your Data Privacy, Security and Regulatory Compliance Waver [Audio]

COVID-19 has had a dramatic impact on nearly all aspects of organizations nationwide – from employee safety to reimagined workplaces to financial hardships. But cyber protection and response during the pandemic cannot take a...more

12 Ways to Ensure Strong Cybersecurity During the COVID-19 Pandemic

In addition to the upheaval and emergency measures taken to combat the COVID-19 virus, organizations are increasingly vulnerable to cyber-attacks. A key driver of that vulnerability is an at-home workforce using older...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide