On July 18, 2024, Judge Paul A. Engelmeyer in the US District Court for the Southern District of New York issued a 107-page opinion dismissing most of the claims against software company SolarWinds and its chief information...more
The recent ransomware attack against the Duvel Moortgat Brewery demonstrated the very real risk that cybersecurity incidents pose to the alcohol industry, reportedly halting operations for several days at four of Duvel...more
In this series of articles, we explore the different certification requirements of CMMC Levels 1, 2 and 3; the impact on contractors and external service providers; and proposed next steps...
On December 26, 2023, the US...more
Substantial changes to the California Consumer Privacy Act (CCPA) are coming soon through five sets of proposed regulations governing (1) cybersecurity audits, (2) privacy risk assessments, (3) artificial...more
CROSS-PRACTICE TEAM RECOVERS $6 MILLION FROM BITCOIN THIEF IN SHORT ORDER -
The Challenge:
In the emerging cryptocurrency space, most investors store their assets in digital wallets, where—unlike traditional bank...more
12/16/2021
/ Bitcoin ,
Chapter 11 ,
Clean Energy ,
Competition ,
Corporate Crimes ,
Cryptocurrency ,
Cybersecurity ,
Department of Justice (DOJ) ,
EU ,
Green New Deal ,
Investors ,
NIST ,
Ransomware ,
Renewable Energy ,
Taxation ,
Trading Platforms ,
White Collar Crimes
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) recently issued a Ransomware Profile identifying steps organizations can take to prevent, respond to and recover from...more
9/24/2021
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Loss Prevention ,
Data Privacy ,
Data Protection ,
Data Security ,
NIST ,
Popular ,
Ransomware ,
Risk Management
In April, the Chinese government issued a second version of the draft Personal Information Protection Law (Draft PIPL), which will impact global companies. Join us for a joint webinar as we discuss the key provisions of the...more
6/14/2021
/ China ,
Cybersecurity ,
Data Privacy ,
Data Processors ,
Data Protection ,
Data Security ,
International Data Transfers ,
Legislative Agendas ,
Multinationals ,
Personal Data ,
Personally Identifiable Information ,
Privacy Laws ,
Webinars
As a wave of potential privacy legislation sweeps across the country, California continues to lead the way. The recently enacted California Privacy Rights Act (CPRA) adds to the groundbreaking 2018 California Consumer...more
2/19/2021
/ California Consumer Privacy Act (CCPA) ,
California Privacy Rights Act (CPRA) ,
Continuing Legal Education ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Subjects Rights ,
Enforcement Actions ,
Privacy Laws ,
Private Right of Action ,
Risk Mitigation ,
Webinars
Hope for the best, but plan for the worst. Join us as we address ways to protect family privacy from external threats, and policies and procedures for handling information that individual family members wish to keep private...more
5/19/2020
/ Coronavirus/COVID-19 ,
Cyber Threats ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Family Businesses ,
Family Offices ,
Hackers ,
Identity Theft ,
Policies and Procedures ,
Remote Working ,
Webinars
On January 30, the US Department of Defense (DoD) released version 1.0 of the Cybersecurity Maturity Model Certification (CMMC) framework, which will require DoD contractors and subcontractors to obtain third-party...more
2/4/2020
/ Attorney-Client Privilege ,
Certification Requirements ,
Controlled Unclassified Information (CUI) ,
Cybersecurity ,
Cybersecurity Maturity Model Certification (CMMC) ,
Defense Contracts ,
Defense Sector ,
Department of Defense (DOD) ,
DFARS ,
Federal Acquisition Regulations (FAR) ,
Federal Contractors ,
Intellectual Property Protection ,
NIST ,
Popular ,
Subcontractors ,
Supply Chain
Now that CCPA has taken effect, how have California consumers, regulators and plaintiffs’ class action lawyers responded to the new law? We’ll review early developments in the California consumer privacy landscape, address...more
1/23/2020
/ California Consumer Privacy Act (CCPA) ,
Class Action ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Personally Identifiable Information ,
Privacy Laws ,
Regulatory Requirements ,
Risk Mitigation ,
Webinars
Effective as of January 1, 2020, the California Consumer Privacy Act (CCPA) gives broad rights to people on their personal data in the custody of companies. This focus on data rights significantly raises the compliance burden...more
1/16/2020
/ Automation Systems ,
Best Practices ,
California Consumer Privacy Act (CCPA) ,
Compliance ,
Consent ,
Consumer Privacy Rights ,
Continuing Legal Education ,
Cybersecurity ,
Data Collection ,
Data Management ,
Data Privacy ,
Data Protection ,
Data Security ,
Data Subject Access Requests ,
Data Subjects Rights ,
Discovery ,
Events ,
Information Security ,
Information Technology ,
Personal Data ,
Personally Identifiable Information ,
Privacy Laws ,
Regulatory Requirements ,
Risk Assessment ,
Vendor Contacts ,
Vendors
Effective as of January 1, 2020, the California Consumer Privacy Act (CCPA) gives broad rights to people on their personal data in the custody of companies. This focus on data rights significantly raises the compliance burden...more
1/14/2020
/ Automation Systems ,
Best Practices ,
California Consumer Privacy Act (CCPA) ,
Compliance ,
Consent ,
Consumer Privacy Rights ,
Continuing Legal Education ,
Cybersecurity ,
Data Collection ,
Data Management ,
Data Privacy ,
Data Protection ,
Data Security ,
Data Subject Access Requests ,
Data Subjects Rights ,
Discovery ,
Events ,
Information Security ,
Information Technology ,
Personal Data ,
Personally Identifiable Information ,
Privacy Laws ,
Regulatory Requirements ,
Risk Assessment ,
Vendor Contacts ,
Vendors
Recent months have seen a wave of ransomware attacks in the US healthcare industry, many involving a sophisticated strain of malware called Ryuk. To protect themselves, healthcare providers should review OCR’s recent guidance...more
12/12/2019
/ Criminal Investigations ,
Cyber Attacks ,
Cybersecurity ,
Electronic Protected Health Information (ePHI) ,
FBI ,
Health Care Providers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
New Guidance ,
OCR ,
Patient Privacy Rights ,
Popular ,
Ransomware ,
US-CERT
With the California Consumer Privacy Act (CCPA) effective date of January 1, 2020, fast approaching, businesses subject to California’s new privacy law must come into compliance with a number of new obligations. That burden...more
11/12/2019
/ Best Practices ,
California Consumer Privacy Act (CCPA) ,
Class Action ,
Continuing Legal Education ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Information Security ,
Personally Identifiable Information ,
Privacy Laws ,
Private Right of Action ,
Risk Mitigation ,
Webinars
California has taken bold steps to regulate the privacy and security of personal information, creating unprecedented remedies for data breaches and recognized European-style rights for consumers in their data.
On September...more
8/9/2019
/ Big Data ,
California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Continuing Legal Education ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Emerging Technology Companies ,
Events ,
Information Technology ,
Popular ,
Risk Management ,
Security Risk Assessments ,
State Data Privacy Laws
Information is one of your company’s most valuable assets. It is critical to remain vigilant to protect against the latest cybersecurity threats and to comply with expansive privacy obligations.
Join us in New York City for...more
5/20/2019
/ Attorney-Client Privilege ,
California Consumer Privacy Act (CCPA) ,
Continuing Legal Education ,
Cybersecurity ,
Data Privacy ,
Events ,
Health Care Providers ,
Information Management ,
Information Technology ,
Popular ,
Private Equity ,
Privileged Communication ,
Risk Management ,
Security and Privacy Controls
Information is one of your company’s most valuable assets. Now more than ever before, it is critical to remain vigilant to protect against today’s latest cybersecurity threats and to comply with increasingly expansive privacy...more
The SEC has released a new report on cyber fraud, suggesting that public companies that fail to implement appropriate preventative measures risk violating the internal accounting control provisions of the Exchange Act....more
Enforceable in all EU member states on 25 May 2018, the General Data Privacy Regulation will require action by organisations both inside and outside the European Union to ensure compliance with this far-reaching privacy legal...more
This article briefly introduces the emerging regulatory framework for autonomous and connected vehicles in the US and in certain key jurisdictions around the world, with particular emphasis on regulations pertaining to...more
1/23/2018
/ Australia ,
China ,
Cybersecurity ,
DRIVE Act ,
Driverless Cars ,
EU ,
France ,
Germany ,
Japan ,
Motor Vehicles ,
NHTSA ,
UK
New cybersecurity regulations issued by the NYDFS define the nonpublic information they regulate in exceptionally broad terms. This expanded definition of Nonpublic Information will create major challenges for regulated...more
On 6 August 2017, the UK government released ‘The Key Principles of Vehicle Cyber Security for Connected and Automated Vehicles’, guidance aimed at ensuring minimum cybersecurity protections for consumers in the manufacture...more
The government is continuing to ask for more help from the private sector to defend against cyber attacks. The National Infrastructure Advisory Council (NIAC) recently published a report discussing current cyber threats and...more
In today’s digital age, data privacy and security incident response plans are critical. Companies need to have a well-designed cybersecurity plan to protect their systems from attacks and respond to a crisis when they are...more