News & Analysis as of

Cybersecurity Compliance Data Retention

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Mitratech Holdings, Inc

The Ethics of AI in Recruiting: Bias, Privacy, and the Future of Hiring

If you’re in recruiting, you know that AI is thrown around a lot. AI in recruiting is no longer a concept to keep an eye on for the future. It’s here, reshaping how businesses find talent and build hiring processes....more

Benesch

Staying Ahead of the Curve: Adapting to Evolving Cyber Regulatory Enforcement

Benesch on

As calls for executive accountability for cybersecurity intensify, it is essential for companies to scrutinize the adequacy of ephemeral messengers, such as Signal, WhatsApp, WeChat, and Snapchat, in light of both present and...more

Bradley Arant Boult Cummings LLP

Complying With the FTC's Amended Safeguards Rule

Cybersecurity is a looming threat for most businesses. The impact of a major cyber event can resonate for weeks, months, and even years after the initial attack. To mitigate the risks to consumers, there have been several...more

Hanzo

[Webinar] Luminary Series: How Recent Regulatory Rulings Are Shaping Compliance - July 28th, 1:00 pm ET

Hanzo on

When it comes to ensuring enterprise data is safe, understanding recent rulings from different regulatory bodies and how they affect your organization is a vital first step, followed by reasonable measures to further...more

Ankura

Build A Data Inventory That Benefits Everyone

Ankura on

A data inventory is the fundamental building block for an effective privacy program.  In its simplest form, a data inventory can be thought of as a matrix which documents 1) what personal data is being collected by the...more

White & Case LLP

Building a Robust Biometric Compliance Program in the US: A Five-Step Checklist

White & Case LLP on

As companies across industries continue to take advantage of existing and emerging technologies that involve the collection and use of human biometric identifiers, corporate privacy programs must take into account the unique...more

6 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide