Encryption is one of several cornerstones of a robust information security program. Articles on quantum computing often include the compelling narrative that encryption is at risk, but as with any revolutionary technology,...more
Novel technologies that seek to improve quality of life or simplify complex processes offer great promise. For example, medical technologies that detect or cure disease or supply chain technologies that allow for real time...more
In Part I, we discussed the European Commission’s (“Commission”) disapproval of Meta’s “pay or consent” subscription model. In Part II, we delve into the European Commission’s findings, prior findings by the European Data...more
7/29/2024
/ Consent ,
Corporate Counsel ,
Data Privacy ,
Data Protection ,
Data Security ,
EU ,
European Commission ,
European Data Protection Board (EDPB) ,
European Economic Area (EEA) ,
Investigations ,
Personal Data ,
Popular ,
Privacy Laws
For many, responding to an incident feels chaotic — questions swirling, uncertainties piling up, and no clear direction. Even when prepared with a well-rehearsed incident response plan, a data security incident places a...more
As Cybersecurity Awareness Month comes to an end and the spooky season of Halloween is upon us, no one wants to live through a cybersecurity horror story. There are some simple precautions every business and household can...more
Cyber risks are increasing, and as a result, due diligence inquiries and valuations are increasingly focusing on the cybersecurity and privacy risks inherent in a business’s collection, use, retention and disposal of...more
7/14/2022
/ Acquisitions ,
Board of Directors ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Security ,
Due Diligence ,
Information Technology ,
Investors ,
Mergers ,
Risk Factors ,
Risk Management ,
Technology Sector
Thank you so much for joining us in this interview series! Before we dig in, our readers would like to get to know you. Can you tell us a bit about how you grew up?
I grew up in a small town of about 3,500 in rural North...more
4/18/2022
/ Business Entities ,
Compliance ,
Corporate Governance ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Security ,
Incident Response Plans ,
Internet of Things ,
Popular ,
Technology Sector
Florida has joined the wave of states considering new comprehensive data privacy legislation. On February 15, 2021, Rep. Fiona McFarland introduced HB 969, modeled after the California Consumer Privacy Act (CCPA). The bill is...more
3/29/2021
/ California Consumer Privacy Act (CCPA) ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Security ,
Florida ,
Governor DeSantis ,
Local Ordinance ,
New Legislation ,
Personal Information ,
Privacy Laws ,
Regulatory Reform
Back in March we wrote about Address Confidentiality Programs (ACPs) as the “high stakes compliance risk you probably haven’t heard of.” These state-sponsored programs were traditionally designed to protect victims of crimes...more
9/30/2020
/ Compliance ,
Contact Tracing ,
Coronavirus/COVID-19 ,
Cyber Threats ,
Data Collection ,
Data Security ,
Domestic Violence ,
Executive Orders ,
Governor Newsom ,
Harassment ,
Healthcare Workers ,
Human Trafficking ,
Public Health ,
Sexual Assault ,
State and Local Government
We are a little more than two weeks into the new year and we’ve already seen several states introduce comprehensive privacy legislation on the heels of California’s Consumer Privacy Act (CCPA). It is no easy task to stay on...more
1/21/2020
/ Consumer Privacy Rights ,
Corporate Counsel ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Security ,
Legislative Agendas ,
Opt-Outs ,
Personally Identifiable Information ,
Privacy Laws ,
Private Right of Action ,
Proposed Legislation
The dust has finally settled in the California State Legislature and the big winner for amendments to the CCPA is AB-25, which started out as carving out employees from the definition of consumer for the purpose of CCPA. The...more
9/18/2019
/ Amended Legislation ,
California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Data Security ,
Disclosure Requirements ,
Opt-Outs ,
Personally Identifiable Information ,
Popular ,
Privacy Laws ,
Private Right of Action ,
Statutory Requirements
Technology and the critical infrastructure that support our personal pursuits and business operations are ripe targets for cyberattacks. In particular, the electrical grid that transmits electricity from its point of...more
1/16/2019
/ Big Data ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Electricity ,
Energy Sector ,
Hackers ,
Information Sharing ,
Popular ,
Power Grid ,
Power Plants ,
Renewable Energy ,
Risk Mitigation ,
Technology Sector ,
Utilities Sector ,
Vendors
On January 1st, South Carolina became the first state to adopt the model insurance data security law requiring certain insurance licensees to investigate and report cybersecurity events in the state of South Carolina. The law...more
1/7/2019
/ Covered Entities ,
Cyber Incident Reporting ,
Cybersecurity ,
Data Security ,
Employer Liability Issues ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Independent Contractors ,
New Legislation ,
Notification Requirements ,
Personally Identifiable Information ,
Popular ,
Reporting Requirements ,
Third-Party Service Provider
Every day, new instances of data breaches, ransomware attacks, and cybercrimes affect companies around the world. Many of these companies are in the construction industry. For some, the thought of protecting one’s...more
8/16/2018
/ Construction Industry ,
Construction Workers ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Employee Training ,
Popular ,
Ransomware ,
Risk Mitigation
On October 18, 2017, the Consumer Financial Protection Bureau (CFPB) outlined nine non-binding Consumer Protection Principles (the Principles) for the access and sharing of consumer information between third-party companies....more
11/29/2017
/ Banking Sector ,
Consumer Financial Protection Bureau (CFPB) ,
Consumer Watchdog ,
Cybersecurity ,
Data Controller ,
Data Security ,
Dodd-Frank ,
EU ,
Financial Institutions ,
General Data Protection Regulation (GDPR) ,
International Data Transfers ,
Online Payments ,
Personally Identifiable Information ,
Popular ,
Transparency ,
UDAAP
On November 21, 2016, the comment period closed on the Federal Trade Commission's (FTC) request for public feedback on the Standards for Safeguarding Consumer Information Rule (Safeguards Rule). The FTC is considering...more