Latest Posts › Cybersecurity

Share:

The EU’s AI Act: Obligations of AI Users and GDPR Article 35

In December 2023, European Union (EU) lawmakers reached an agreement on the EU AI Act. In our article titled An Introduction to the EU AI Act, we focused on applicability, thresholds, timing, and penalties related to the EU...more

EU’s AI Act: AI Risk Management System

In December 2023, European Union (EU) lawmakers reached an agreement on the EU AI Act. In our prior article titled “An Introduction to the EU AI Act,” we focused on the applicability, timing, and penalties of the EU AI...more

Privacy Impact Assessments – Practical Considerations

This is the first of a multi-article series focused on privacy impact assessments. This first article provides an overview of privacy impact assessments, the existing and pending privacy laws which require privacy impact...more

New Proposed Laws include Safe Harbor when Aligned with NIST Privacy Framework

A new trend in privacy and cybersecurity laws is the introduction of safe harbor clauses for aligning data protection controls to recognized data privacy and cybersecurity frameworks. OHIO HB376: In July 2021, Ohio...more

5 Best Practices for Third Party Risk Management

Organizations are becoming increasingly reliant on external parties to manage parts of their business. The centralized knowledge, expertise, and economies of scale that third parties provide enables organizations to focus...more

New SCCs are here: what they mean and what you need to do next.

After much anticipation, the European Commission has published new Standard Contractual Clauses (SCCs). Under the General Data Protection Regulation (GDPR), when personal data of individuals in the European Economic Area...more

Privacy Considerations in Debt Refinancing and Equity Seed Funding – Are you prepared?

In an era of increased M&A transactions, organizations must understand the risks and potential liabilities associated with the personal information they obtain on their customers, vendors, and employees....more

11 Months After Schrems II - How Are Organizations Addressing Risk?

Organizations are closely tracking which of their vendors previously relied on Privacy Shield. Separately, they are preparing Transfer Impact Assessments (“TIAs”) to evaluate and address risks associated with personal data...more

Build A Data Inventory That Benefits Everyone

A data inventory is the fundamental building block for an effective privacy program.  In its simplest form, a data inventory can be thought of as a matrix which documents 1) what personal data is being collected by the...more

9 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide