News & Analysis as of

Cybersecurity Data Mapping

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Osano

It's Time to Think About Data Mapping Differently

Osano on

Are you overwhelmed by data mapping? Is it a daunting process for your privacy team? That's not surprising, and you are not alone. Conventional data mapping methods heavily rely on direct integrations, leading to unnecessary...more

Osano

Privacy Data Mapping: How to Map Sensitive Data & PII

Osano on

Sprawling. That’s one way to describe the nature of data and responsibilities in modern organizations. There’s a lot of personally identifiable information (PII) and sensitive data to track, and knowing what lives where so...more

Ankura

Common Causes of CFIUS Agreement Non-Compliance and Enforcement Risk

Ankura on

Following the update to the Committee on Foreign Investment in the United States (“CFIUS” or the “Committee”) Enforcement and Penalty Guidelines, the Committee has continued to signal its intention to more heavily leverage...more

Bradley Arant Boult Cummings LLP

Network Topology and Mapping: Cornerstones of Data Security – Part 1

Data security is a top concern for organizations in today’s digital landscape. It protects data from unauthorized access, use, modification, or disclosure, and requires implementing technical, administrative, and physical...more

Ankura

Implementing the Sedona Conference on Information Governance: Principles 4-6

Ankura on

The Sedona Conference is a widely known institute that is focused on the study of law and policy in many areas including Information Governance (IG). The Sedona Conference Commentary on Information Governance provides 11 IG...more

NAVEX

The New Normal Workplace (pt. 1) – R&C Management

NAVEX on

Most businesses began 2021 with ambitions to return to the office. But in keeping with a trend of disruption, we are faced with new COVID variants, questions on when and how schools will respond, a cultural shift towards...more

Bracewell LLP

Updates to Saudi Arabia's Data Protection Law

Bracewell LLP on

Whilst European and North American businesses are well accustomed to dealing with complex data protection legislation, businesses in the MENA region have by and large not had to consider the same in their local markets. ...more

Sheppard Mullin Richter & Hampton LLP

More Regulatory Clarity on the Horizon for FinTech

On September 21, 2021, the FinTech task force of the U.S. House Committee on Financial Services held a hearing on consumer privacy. The hearing was live-streamed and the archived webcast is available on the Committee website....more

HaystackID

[Webcast Transcript] Operationalizing Data Mapping: From Practices and Protocols to Proven Processes

HaystackID on

Editor’s Note: On June 23, 2021, HaystackID shared an educational webcast designed to inform and update legal and data discovery professionals on how to consider and operationalize data mapping processes utilized in the...more

NAVEX

4 Things to Know About Updated NIST 800-53 Standards

NAVEX on

[author: Matt Kelly] In September 2020 the National Institute of Standards and Technology (NIST) unveiled the fifth version of its cybersecurity standard formally known as SP 800-53, “Security and Privacy Controls for...more

Carlton Fields

California Privacy Rights Act: Compliance Objectives for 2021

Carlton Fields on

While California has been characterized by some of the nation’s most long-standing and aggressive privacy laws, businesses operating in the state have faced uncertainty over the last three years as to what a final omnibus...more

Davis Wright Tremaine LLP

X Marks the Spot Where the Personal Information is Stored: Avoiding Common Mistakes in Data Mapping

"Go to the room with the wires and a quiet hum. Personal information, you're likely to find some." With new global privacy laws requiring consumer access to specific pieces of personal information and documentation of...more

Hogan Lovells

California Consumer Privacy Act: The Challenge Ahead — Data Mapping and the CCPA

Hogan Lovells on

What personal information do you have about California consumers and households? The California Consumer Privacy Act of 2018 (“CCPA”) provides a series of new compliance obligations and operational challenges for companies...more

BCLP

Data Privacy and Security: A Practical Guide for In-House Counsel, 2017 Edition

BCLP on

Boulder Partner David Zetoony published the 2017 edition of his handbook, Data Privacy and Security: A Practical Guide for In-House Counsel, on Jan. 28 – Data Privacy Day. The guide provides an overview of laws relevant to a...more

14 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide