Latest Posts › Data Protection

Share:

Virginia’s High-Risk AI Developer and Deployer Act Awaits Governor’s Signature

On February 20, 2025, the Virginia General Assembly passed HB 2094 the Virginia High-Risk Artificial Intelligence Developer and Deployer Act (the “Act”). The bill now awaits signature by Governor Youngkin. If it becomes law,...more

[Webinar] CLE Institute 2021 - October 8th, 9:30 am - 4:00 pm EDT

We are pleased to present the 2021 Williams Mullen CLE Institute, a virtual legal education program aimed to educate and provide timely legal guidance, as well as to help you to secure your CLE credits. Our 2021 programs...more

FAQs: Virginia Consumer Data Protection Act

Virginia Governor Ralph Northam signed the Consumer Data Protection Act (the “Act”) on March 2, 2021. The following are answers to some frequently asked questions about the Act and its impact on organizations doing business...more

Data & Privacy Update: Biometric, Ransomware, PIPEDA and EU-UK Data Transfers

2021 promises to be an exciting year in the data and privacy space. With the adoption of technologies that collect, analyze, aggregate, distribute and share data, and the implementation of new laws and regulations in...more

Data & Privacy Legal Developments: Virginia Consumer Data Protection Act, Data Scraping, CFIUS and more

2021 promises to be an exciting year in the data and privacy space. With the adoption of technologies that collect, analyze, aggregate, distribute and share data, and the implementation of new laws and regulations in...more

Protecting Your Sensitive Information While Using Virtual Meeting Platforms

Over the last several weeks, virtual meetings have become the new normal for many businesses. Improvements in the technology now mean that virtual meetings have a similar look and feel as in-person meetings. However, there is...more

The Need for Enhanced Risk-Based Information Security Policies with a Remote Workforce

For some time, government agencies such as the National Institute of Standards and Technology (NIST) have recognized that a “one size fits all approach” is not practical from an information security standpoint. Instead,...more

CCPA: Implementing the Right Cybersecurity Plan Is Now a Legal Issue

Addressing cybersecurity risks invariably involves very technical matters. As a result, in many companies the IT department has been responsible for developing and implementing cybersecurity plans and procedures....more

[Webinar] Data Protection and Privacy: Due Diligence Issues in M&A Transactions - October 15th, 11:00 am ET

As data are quickly becoming significant corporate assets, it’s important to help companies both maximize the value of their data and protect the business against any associated risks. This is particularly true in M&A...more

A Framework of Due Diligence of Data in an M&A Transaction

The broad adoption of technologies that collect, analyze, store and distribute data is disrupting a number of industries. It is also proving to be a challenge for lawyers attempting to apply existing laws and regulations to...more

Data Due Diligence In M&A Transactions: Ownership Rights in Data

As data are quickly becoming a significant corporate asset, lawyers in corporate transactions need to consider the legal risks associated with data. Failure to understand and address these risks can result in significant...more

Due Diligence of Corporate Data Assets In M&A Transactions: Data Protection/Privacy

As data are quickly becoming significant corporate assets, lawyers need to help companies both maximize the value of their data and protect the business against any associated risks. This is particularly true in M&A...more

Federal Trade Commission’s Uber Consent Agreement Designates Geolocation Information as Personal Information

The Federal Trade Commission (FTC) recently entered a Consent Agreement with Uber that includes “precise geolocation information” in the list of personal information that is to be protected. While the Consent Agreement only...more

Drones and Privacy Just Got More Complicated (Table Included)

As businesses seek to integrate into their workflows data collected from Unmanned Aircraft Systems (UAS), commonly known as drones, they are confronted with a very sensitive and complex issue: privacy. Currently, there...more

[Event] 2015 Cybersecurity Seminar: Identifying and Mitigating Data Breaches and Related Liabilities - Oct. 29th, Richmond, VA

October is National Cyber Security Awareness Month! Please join Williams Mullen, Marsh and EY for an in-depth discussion on effective strategies for identifying and mitigating data breach and related liabilities. WHO...more

16 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide