Welcome to this month's issue of The BR Privacy & Security Download, the digital newsletter of Blank Rome’s Privacy, Security & Data Protection practice. ...more
10/7/2022
/ COPPA ,
Cybersecurity ,
Cybersecurity Information Sharing Act (CISA) ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
FISA ,
Internet of Things ,
Online Safety for Children ,
Popular
Welcome to this month's issue of The BR Privacy & Security Download, the digital newsletter of Blank Rome’s Privacy, Security & Data Protection practice. ...more
Welcome to this month's issue of The BR Privacy & Security Download, the digital newsletter of Blank Rome’s Privacy, Security & Data Protection practice. ...more
8/5/2022
/ Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Health Insurance Portability and Accountability Act (HIPAA) ,
NIST ,
Personal Data ,
Personal Information ,
Popular ,
Privacy Laws
Welcome to this month's issue of The BR Privacy & Security Download, the digital newsletter of Blank Rome’s Privacy, Security & Data Protection practice. ...more
Welcome to this month's issue of The BR Privacy & Security Download, the digital newsletter of Blank Rome’s Privacy, Security & Data Protection practice. ...more
6/3/2022
/ California Consumer Privacy Act (CCPA) ,
California Privacy Rights Act (CPRA) ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Justice (DOJ) ,
Federal Trade Commission (FTC) ,
Personal Data ,
Popular ,
Privacy Laws ,
State Privacy Laws
STATE & LOCAL LAWS & REGULATIONS -
Connecticut Passes Comprehensive Privacy Bill -
The Connecticut Legislature has become the fifth state in the United States to pass a comprehensive privacy law....more
Welcome to this month's issue of The BR Privacy & Security Download, the digital newsletter of Blank Rome’s Privacy, Security & Data Protection practice. ...more
3/4/2022
/ Biometric Information ,
Biometric Information Privacy Act ,
California Consumer Privacy Act (CCPA) ,
CNIL ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Information Commissioner's Office (ICO) ,
Investment Adviser ,
NIST ,
Popular ,
Privacy Laws ,
Securities and Exchange Commission (SEC) ,
Workers Compensation Act
Welcome to this month's issue of The BR Privacy & Security Download, the digital newsletter of Blank Rome’s Privacy, Security & Data Protection practice. ...more
2/4/2022
/ Biometric Information ,
Biometric Information Privacy Act ,
California Consumer Privacy Act (CCPA) ,
CDPA ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data Protection ,
Personal Data ,
Popular ,
State Privacy Laws
Welcome to this month's issue of The BR Privacy & Security Download, the digital newsletter of Blank Rome’s Privacy, Security & Data Protection practice. We invite you to share this resource with your colleagues and visit...more
Welcome to this month's issue of The BR Privacy & Security Download, the digital newsletter of Blank Rome’s Privacy, Security & Data Protection practice. The rapid pace at which technology and data privacy and security...more
12/3/2021
/ Banking Regulators ,
CFIUS ,
Cybersecurity ,
Cybersecurity Information Sharing Act (CISA) ,
Cybersecurity Maturity Model Certification (CMMC) ,
Data Breach ,
Data Privacy ,
Data Security ,
European Data Protection Board (EDPB) ,
FDIC ,
General Data Protection Regulation (GDPR) ,
OCC ,
Popular
Welcome to this month's issue of The BR Privacy & Security Download, the new digital newsletter of Blank Rome’s Privacy, Security & Data Protection practice. The rapid pace at which technology and data privacy and security...more
11/5/2021
/ Biometric Information Privacy Act ,
California Consumer Privacy Act (CCPA) ,
Cybersecurity ,
Cybersecurity Information Sharing Act (CISA) ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Justice (DOJ) ,
Federal Trade Commission (FTC) ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Internet Service Providers (ISPs)
This is the second part of a two-part article examining the enactment of California’s Internet of Things (“IoT”) security law, and the wave of similar IoT laws expected to follow close behind in 2020. The first part of this...more
This is the first article in a two-part series examining the enactment of California’s Internet of Things ("IoT") security law, and the wave of similar IoT laws expected to follow close behind in 2020. This part discusses the...more
With the COVID-19 related increase in remote work, anxious employees are being increasingly targeted by cyber criminals and hackers with phishing scams, business e-mail compromise schemes, and malicious ransomware. At the...more
6/12/2020
/ Asset Management ,
Best Practices ,
Business E-Mail Compromise (BEC) ,
Confidential Business Information (CBI) ,
Coronavirus/COVID-19 ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Intellectual Property Protection ,
Phishing Scams ,
Ransomware ,
Remote Working ,
Risk Mitigation ,
Trade Secrets ,
Webinars
As the COVID-19 pandemic continues to cause chaos across the globe, cyber attacks seeking to exploit the crisis on the rise as well. In particular, the frequency of COVID-19 business e-mail compromise (“BEC”) schemes—a...more
In recent weeks, the coronavirus (COVID-19) has taken the United States by storm, causing panic and fear across the country. The recent outbreak, which originated in China and is now spreading across the world, has been...more
Becoming better versed in issues surrounding cybersecurity and social media risk would greatly benefit general counsel at publicly traded companies, according to a recent survey of executive leadership....more
As April comes to a close, it’s time once again for Verizon Enterprise Solutions’ Data Breach Investigations Report to remind us just how important data security is to the corporate world.
Released Wednesday, the report,...more