We’re back with a deeper dive into the 2024 Data Security Incident Response Report, which features insights and metrics from 1,150+ incidents in 2023.
This episode dives deeper into information governance and...more
Christmas came early when on December 24, the Oregon Office of the Attorney General (OAG) delivered AI guidance wrapped in a bow. Titled “What you should know about how Oregon’s laws may affect your company’s use of...more
Following several years of drafts and negotiations, on March 13, the European Parliament approved the EU’s Artificial Intelligence Act (the AI Act), making it the world’s first comprehensive AI legislation....more
We’re back with a deeper dive into the 2023 Data Security Incident Response Report, which features insights and metrics from 1,160+ incidents in 2022.
This episode dives deeper into information governance.
Questions &...more
Our 2022 Data Security Incident Response Report discussed how businesses can be better positioned to meet the tight data breach notification deadlines now imposed in dozens of countries worldwide. In particular, we...more
7/15/2022
/ California Privacy Rights Act (CPRA) ,
Data Deletion ,
Data Management ,
Data Protection ,
Data Retention ,
Electronically Stored Information ,
General Data Protection Regulation (GDPR) ,
Legitimate Business Purpose ,
Personal Data ,
Regulatory Authority ,
Risk Mitigation
Many businesses have remote work and bring-your-own-device policies that cover access to company systems and information from personal devices. ...more
On Feb. 6, 2018, the Article 29 Working Party (Working Party 29) published Working Paper 261 (WP 261), which provided guidance on the provisions of Article 49 of the European Union’s (EU) General Data Protection Regulation...more
The DESI VII Workshop titled “Using Advanced Data Analysis in eDiscovery & Related Disciplines to Identify and Protect Sensitive Information in Large Collections” was held on the Strand Campus of King’s College in London on...more
As noted in the 2017 BakerHostetler Data Security Incident Response Report, the enactment of the EU General Data Protection Regulation (GDPR) represents the most significant change in European data protection law in more than...more
Outside hacking attacks grab headlines. Data breach concerns cause sleepless nights within the C-suite of many organizations. And ransomware strikes fear into companies without sound backup practices and true Information...more
This is the second blog post in Discovery Advocate’s new series, “Your First Five Questions,” in which we identify a question commonly (or sometimes not so commonly) seen in practice followed by the first five questions you...more
2014 has been perhaps the biggest year Information Governance (“IG”) has seen. A relatively small and, if not unknown, at least undefined field only a few years ago has grown into an area of interest—and concern—to many...more
Information is the lifeblood of businesses today. As the volume of data continues to grow exponentially, intelligent governance of information is essential for enterprises to survive and thrive. Data security concerns,...more
2013 was a year in contrasts within data privacy. To begin with the “normal” course, Canada sought (but failed) to pass a mandatory breach notification amendment to its federal privacy law, and Uruguay acceded to the European...more
Ukraine privacy law is undergoing a dramatic shift with its introduction of new legislation, “On Amending Certain Legislative Acts of Ukraine Regarding Improving the System of Personal Data Protection,” enacted on July 3,...more
This fall, Canadian Parliament failed to pass proposed amendments to its federal privacy law that would impose a mandatory breach notification requirement. Bill C-12, originally introduced in 2010 and reintroduced in 2011,...more
On August 22, 2013, after four years of deliberation, the South African Parliament passed the first comprehensive data protection legislation in South Africa, the Protection of Personal Information (POPI) Bill. This Bill...more
Outside of the EU, concerns continue after the former NSA contractor Edward Snowden leaks demonstrated issues related to U.S. handling of European data. Beginning in July, 2013, the ongoing Transatlantic Trade and Investment...more
1. Costa Rica -
On March 5, 2013, Costa Rica’s data protection law, originally passed in 2011, came into force. The law, the Ley Protección de la Persona frente al tratamiento de sus datos personales, Law...more
1. China -
China’s Personal Information Protection Law Proposal was submitted to the State Council in 2008, which was followed by the Ministry of Industry and Information Technology’s non-binding Internet...more
2013 was the year that the term "Information Governance" or "IG" began to be widely used outside of technical circles. Despite that fact, the concept of IG is not well understood. Gartner, a premier information advisory...more