Latest Publications

Share:

Are We (Finally) Ready to Zoom?

Zoom’s video communications platform service and its data privacy issues and security vulnerabilities have been a very hot topic of late, covered by numerous media outlets and in our recent Password Protected post. Due in...more

Privacy vs. Containment, Part 2: The Democratic Answer to a Framework for Federal Privacy Legislation on COVID-19

Two weeks ago we wrote about proposed legislation, The COVID-19 Consumer Data Protection Act of 2020 (“CCDPA”), introduced by a group of senior Republican senators, which was designed to address privacy issues arising in the...more

Privacy vs. Containment: Federal Privacy Legislation Meets COVID-19

As the federal, state, and local governments and industry grapple with how to respond to and prevent the spread of COVID-19, a group of senior Republican senators recently announced consumer privacy legislation designed to...more

Updates to State Data Breach Laws

Personal information has become the prey of relentless poachers. In light of the influx of data breaches, state legislatures are taking action. Not surprisingly, now every state has enacted data breach notification laws,...more

DoD Cyber Compliance Deadline Fast Approaching – Here’s What Government Contractors Need to Know

U.S. Department of Defense (DoD) contractors face new cybersecurity compliance requirements, including a significant deadline set for December 31, 2017. Most DoD contracts now include clauses imposing obligations on...more

Government Response to Increasing Cyber Threats

Government agencies collect and hold massive amounts of personally identifiable information (PII), creating valuable targets for cybercrime. Recently proposed legislation would impose baseline standards for cyber hygiene on...more

A Closer Look: Practical Tips to Managing a Ransomware Attack Part 2

Part 1 of this two part series laid out the state of the industry regarding ransomware. In Part 2, this post will examine what steps to take, or not to take, during and after a ransomware attack. “We’ve Been Hit – Now...more

A Closer Look: Practical Tips to Managing a Ransomware Attack (Part 1)

The Federal Trade Commission (FTC) is conducting a three-part fall conference workshop on select technology issues. The first conference was held on September 7th about ransomware. The second conference was held on October...more

Intellectual Property in Government Contracts – Landmines Abound

Intellectual property is often a company’s most valuable asset. For companies with federal government customers, following the government’s rules can mean the difference between maximizing and losing value in newly developed...more

9 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide