As AI systems become more complex, companies are increasingly exposed to reputational, financial and legal risk from developing and deploying AI systems that do not function as intended or that yield problematic outcomes. The...more
9/4/2024
/ Artificial Intelligence ,
Corporate Governance ,
Cybersecurity ,
Data Privacy ,
EU ,
Machine Learning ,
Privacy Laws ,
Regulatory Agenda ,
Regulatory Requirements ,
Risk Assessment ,
Risk Management ,
Technology Sector ,
UK
In this month’s Privacy & Cybersecurity Update, we examine Delaware’s new comprehensive data privacy law, a joint statement by 12 data protection authorities on data scraping and data protection, a district court ruling on a...more
10/3/2023
/ California Privacy Protection Agency (CPPA) ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Popular ,
Privacy Laws ,
Risk Assessment ,
Risk Management ,
State and Local Government ,
State Data Privacy Laws ,
State Privacy Laws ,
Web Scraping
In the past year, the Board of Governors of the Federal Reserve System (the Board) Biden administration officials, and other U.S. banking regulators have repeatedly voiced growing concerns about certain cryptoasset...more
2/7/2023
/ Banking Regulators ,
Banking Sector ,
Banks ,
Biden Administration ,
Blockchain ,
Cryptoassets ,
Cryptocurrency ,
FDIC ,
Federal Reserve ,
Financial Institutions ,
Financial Services Industry ,
OCC ,
Risk Assessment
In this month’s Privacy & Cybersecurity Update, we examine the European Commission’s draft adequacy decision on the EU-U.S. Data Privacy Framework, as well as guidance from the U.K. Information Commissioner’s Office on...more
1/3/2023
/ Biometric Information Privacy Act ,
Cyber Insurance ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Employee Monitoring ,
EU ,
European Commission ,
International Data Transfers ,
Popular ,
Privacy Laws ,
Risk Assessment ,
UK
In this month's edition of our Privacy & Cybersecurity Update, we examine the European Parliament's report on whether and how the use of blockchain technology can comply with the General Data Protection Regulation, as well as...more
9/5/2019
/ Blockchain ,
Consumer Protection Laws ,
Cyber Policies ,
Cybersecurity ,
Data Protection ,
Data Security ,
EU ,
European Parliament ,
False Claims Act (FCA) ,
Federal Contractors ,
General Data Protection Regulation (GDPR) ,
Insurance Industry ,
Misrepresentation ,
NAIC ,
Personally Identifiable Information ,
Popular ,
Privacy Laws ,
Risk Assessment ,
Security Risk Assessments ,
Settlement ,
State Data Breach Notification Statutes ,
State Insurance Administrations ,
Whistleblower Awards ,
Whistleblowers
On August 7, 2017, the Office of Compliance Inspections and Examinations (OCIE) of the U.S. Securities and Exchange Commission (SEC) released a summary of its observations (the report) from cybersecurity examinations of 75...more
8/31/2017
/ Broker-Dealer ,
Customer Information ,
Cybersecurity ,
Cybersecurity Examination Initiative ,
Data Protection ,
Data Security ,
Employee Training ,
Financial Services Industry ,
Information Reports ,
Inventory ,
Investment Adviser ,
Investment Companies ,
OCIE ,
Policies and Procedures ,
Popular ,
Ransomware ,
Regulation S-P ,
Risk Alert ,
Risk Assessment ,
Securities and Exchange Commission (SEC) ,
Senior Managers
In this edition of our Privacy & Cybersecurity Update, we take a look at the FCC's new rules for broadband privacy, the FTC's new playbook for data breach response and notification, the NHTSA's voluntary guidance for...more
11/2/2016
/ Actual Injuries ,
Automotive Industry ,
Breach Notification Rule ,
Broadband ,
Cloud Computing ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Breach Plans ,
Driverless Cars ,
EU ,
FCC ,
Federal Bank Regulatory Agencies ,
Federal Trade Commission (FTC) ,
Financial Institutions ,
FTC Guidelines ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Incident Response Plans ,
IP Addresses ,
National Broadband Plan ,
NHTSA ,
Popular ,
Privacy Laws ,
Risk Assessment ,
Risk Mitigation
New York state has proposed a new regulation — to go into effect January 1, 2017 — that would require banks, insurance companies and other financial services institutions regulated by the New York State Department of...more
9/15/2016
/ Banks ,
Chief Information Security Officer (CISO) ,
Comment Period ,
Covered Entities ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Protection ,
Data Retention ,
Financial Institutions ,
Gramm-Leach-Blilely Act ,
Hackers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Insurance Industry ,
NYDFS ,
Popular ,
Proposed Regulation ,
Risk Assessment ,
Risk Management
Entering 2016, the relentless stream of cyberattacks continues unabated, having become a "business as usual" reality to which companies must adapt. All companies, regardless of size or industry, are potential targets, and the...more
1/21/2016
/ Administrative Authority ,
Class Action ,
Cybersecurity ,
Data Privacy ,
EU ,
EU Data Protection Laws ,
Federal Trade Commission (FTC) ,
FTC Act ,
General Data Protection Regulation (GDPR) ,
Incident Response Plans ,
Information Sharing ,
Injury-in-Fact ,
LabMD ,
OCIE ,
Privacy Laws ,
Risk Assessment ,
Section 5 ,
Securities and Exchange Commission (SEC) ,
Third-Party Release Agrements ,
US-EU Safe Harbor Framework ,
Vendors ,
Wyndham
On September 15, 2015, the U.S. Securities and Exchange Commission (the “SEC”) issued a risk alert release announcing that the Office of Compliance Inspections and Examinations (“OCIE”) will be conducting a new Cybersecurity...more
This past year has been called the "year of the massive data breach," with many high-profile attacks on well-known companies. Skadden partners Cyrus Amir-Mokri, Patrick Fitzgerald, Marc S. Gerber, Stuart D. Levi and Timothy...more
1/27/2015
/ Best Practices ,
Corporate Counsel ,
Cyber Insurance ,
Cybersecurity ,
Data Breach ,
Enforcement Actions ,
Federal Trade Commission (FTC) ,
Popular ,
Retailers ,
Risk Assessment ,
Risk Management ,
Senate Banking Committee ,
Target
On February 12, 2013, President Obama signed both an executive order and a presidential directive that together set forth the administration’s approach to two key cybersecurity related issues: (i) regulating critical...more