As noted , the renewable energy sector faces growing concerns over its vulnerability to cyberattacks. Since then, the situation has not improved; the U.S. electrical grid has grown more vulnerable to cyberattacks, with...more
2/11/2025
/ Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Security ,
Department of Energy (DOE) ,
Energy Sector ,
National Security ,
Popular ,
Renewable Energy ,
Risk Management ,
Solar Energy ,
Supply Chain
Key Point: The FCC revised its breach notification rules for telecommunication providers to broaden the instances when notifications are required, but even with limited exceptions to the new requirements, the final rule...more
Keypoint: To advance the National Cybersecurity Strategy, the Office of the National Cyber Director is soliciting public comments to harmonize cybersecurity regulations, with comments due by October 31, 2023.
In March 2023,...more
The increased concern about ransomware incidents from both quantitative and severity standpoints, spurred the White House to urge corporate business leaders to improve their defenses and resilience posture against ransomware...more
7/27/2021
/ Critical Infrastructure Sectors ,
Cyber Attacks ,
Cybersecurity ,
Department of Homeland Security (DHS) ,
Department of Labor (DOL) ,
Encryption ,
Executive Orders ,
Federal Contractors ,
Joe Biden ,
Multi-Factor Authentication ,
Pipelines ,
Popular ,
Ransomware ,
Software
In the weeks that followed a ransomware attack on a domestic pipeline company, the federal government’s efforts to shore up the cybersecurity posture of America’s critical infrastructure and supply chains, including the oil...more
On March 22, 2021, former two-term Boston Mayor Marty Walsh was confirmed as U.S. Secretary of Labor in a 68-29 Senate vote. The U.S. Chamber of Commerce (Chamber) supported Walsh’s nomination as Secretary of Labor due in...more
5/13/2021
/ ABC Test ,
Biden Administration ,
Coronavirus/COVID-19 ,
Department of Labor (DOL) ,
Fair Labor Standards Act (FLSA) ,
Independent Contractors ,
Joint Employers ,
Minimum Wage ,
OSHA ,
Paid Leave ,
Popular ,
Secretary of Labor ,
Tipped Employees ,
U.S. Commerce Department ,
Wage and Hour
Keypoint: President Biden shows a strong preference for the cybersecurity expertise of former National Security Agency (NSA) leaders with his choices for significant cyber roles within his administration.
On April 12,...more
Keypoint: New Utah law creates incentive for businesses to develop and implement a written cybersecurity program to protect themselves against data breach lawsuits.
On March 11, 2021, Utah governor Spencer Cox signed the...more
3/30/2021
/ Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
DSS ,
GLBA Privacy ,
Health Insurance Portability and Accountability Act (HIPAA) ,
PCI ,
Personally Identifiable Information ,
Popular ,
Risk Management ,
State and Local Government ,
State Data Breach Notification Statutes
Keypoint: April 12, 2021 is the deadline to comment on a proposed rule that would require banking organizations and bank service providers to promptly report computer-security incidents.
The Office of the Comptroller of...more
On January 28, 2021, privacy professionals around the world will celebrate Data Privacy Day. This year, we decided to mark the occasion by gathering our team’s thoughts and expectations on what we expect to be the biggest...more
1/28/2021
/ Biometric Information Privacy Act ,
California Consumer Privacy Act (CCPA) ,
California Privacy Rights Act (CPRA) ,
Consumer Financial Protection Bureau (CFPB) ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Selling ,
Dodd-Frank ,
Facial Recognition Technology ,
FSA ,
Health Care Providers ,
Internet of Things ,
Popular ,
State and Local Government
On December 4, 2020 the President signed into law the IoT Cybersecurity Improvement Act of 2020, Pub. L. No. 116-207 (the “IoT Act”). The legislative purpose behind the new law is to ensure the highest level of cybersecurity...more
12/16/2020
/ Connected Items ,
Consumer Privacy Rights ,
Critical Infrastructure Sectors ,
Cybersecurity ,
Cybersecurity Framework ,
Data Security ,
Department of Homeland Security (DHS) ,
Information Systems Security Program (ISSP) ,
Internet of Things ,
NDAA ,
NIST ,
Popular ,
Subcontractors ,
Technology Sector ,
Trump Administration
On December 4, 2020 the President signed into law the IoT Cybersecurity Improvement Act of 2020, Pub. L. No. 116-207 (the “IoT Act”). The legislative purpose behind the new law is to ensure the highest level of cybersecurity...more
Resulting in Zoom Promising to Implement an Information Security Program, Resembling the SHIELD Act-
Key point: The Letter of Agreement between the New York Attorney General and Zoom Video Communications, Inc. provides...more
Keypoint: Individuals and businesses should take steps to prevent against becoming victims of the rapid rise in Coronavirus-related hacking scams.
On March 20, 2020, the FBI issued an alert warning that cyber thieves are...more
3/24/2020
/ Chief Information Security Officer (CISO) ,
Coronavirus/COVID-19 ,
Cyber Attacks ,
Cybersecurity ,
Cybersecurity Information Sharing Act (CISA) ,
Data Protection ,
FBI ,
Hackers ,
Information Security ,
Phishing Scams ,
Popular ,
Risk Management
Keypoint: 2020 promises to be another ground-breaking year in privacy and cybersecurity law in the United States.
2019 was an exciting year in privacy and cybersecurity law. In the United States, the California Consumer...more
Key Point: If signed by the Governor, the legislation will require entities doing business in New York to implement and maintain reasonable safeguards to protect the security, confidentiality and integrity of private...more
Given the near ubiquitous coverage of proposed CCPA amendments, it may be hard to believe that any bill could fly under the radar, but that appears to be the case with AB 1035, which would amend the CCPA’s private right of...more
As we move into the second month of 2019, we’d like to give an overview of the trends we see developing in the cybersecurity and data privacy area for the year. We’ll be sure to elaborate on these areas with more details as...more
2/5/2019
/ Biometric Information ,
Biometric Information Privacy Act ,
CNIL ,
Cyber Attacks ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Retention ,
General Data Protection Regulation (GDPR) ,
Personally Identifiable Information ,
Popular ,
Ransomware