Latest Posts › Data Privacy

Share:

Mandatory Contractual Provisions Aren’t Just for Business Associate Agreements—New State Privacy Laws May Necessitate a Closer...

Although all fifty states now have data breach notification statutes on the books, a smaller but growing number of states have adopted substantive data privacy laws.  The recently passed California Privacy Rights Act (CPRA)...more

Six Lessons For Your Organization From the SolarWinds Affair

The major current cybersecurity story involves a popular SolarWinds network managing software package, Orion. A sophisticated actor, with the signatures of a nation state, infiltrated Orion in a software update. Once inside,...more

Court Compels Discovery of Cyber Expert Report in Litigation

A federal court has held that neither the work product nor attorney-client privilege doctrines shield a cyber expert’s report from discovery....more

2021 and Beyond: The Top Ten Upcoming Changes In Privacy And Cyber Security

2020 was a year like no other. From an unprecedented “work from home” shift to a blockbuster European court ruling to a mammoth cyber attack, businesses scrambled to adapt to an endless series of cyber challenges. 2021 shows...more

Check Your Paperwork: EU-UK Data Flows In A Post-Brexit Data World

The UK left the EU on January 31, 2020. On Christmas Eve, the two parties signed a Trade and Cooperation Agreement. Under the Agreement, EU personal data can be processed in the UK for six months. The European Commission will...more

European Union Publishes Draft Standard Clauses for Trans-Atlantic Data Transfers

Data Transfer from the European Union to the United States is a knotty process. The difficulties were compounded this summer when Europe’s highest court held the “Privacy Shield” program enabling U.S-E.U. data transfers...more

Crime Does Pay: Business Email Compromise, Organization Vulnerability, and How Hackers Attacked the Wisconsin Republican Party

We have previously written about “phishing.” Phishing involves using social pressure  to trick the recipient to send sensitive information,  network control, or credentials, to hackers posing as authorized users....more

Privacy Shield Goes To Court

In 2015, the European Court of Justice struck down Safe Harbor, the legal device that enabled data transfers from the European Union to the United States. This summer, Safe Harbor’s successor, Privacy Shield, may meet the...more

A Bipartisan Proposal to Beef Up North Carolina's Identity Theft Protection Act

Data privacy regulation tends to take one of two general approaches. In most of the world—but not in the United States—the approach is usually characterized as “omnibus.” Under an omnibus regime, privacy rights are defined at...more

Six Months In, Privacy Shield Is Battered But Holding: Three Notable Developments in U.S-E.U. Data Transfers

The United States has traditionally taken a libertarian approach to data privacy: “what is not forbidden is permitted.” Outside sensitive sectors such as health (HIPAA) and finance (GLBA), the United States was historically...more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide