News & Analysis as of

Cybersecurity Data Protection Confidential Information

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Paul Hastings LLP

NFL Draft Provides Wake-Up Call on Protecting Confidential Information While Working Remotely

Paul Hastings LLP on

Last week’s NFL draft highlighted more than the accomplishments of athletes at the combine or on the field. While there was extensive coverage of the merits of each player, one of the major headlines coming out of the draft...more

U.S. Legal Support

Best Practices to Secure Law Firm Documents

U.S. Legal Support on

Law firms handle confidential information and documents that require diligent protection. The stakes are high, the regulations and their sources are vast, and technology is sophisticated and ever-changing....more

Orrick, Herrington & Sutcliffe LLP

Protecting Trade Secrets: Tips for AI Companies

AI companies should familiarize themselves with trade secret law to safeguard their innovations. A company does not need to register a trade secret to invoke it in litigation, unlike other IP protections. Trade secrets can...more

Jackson Lewis P.C.

Insider Threats: The Overlooked Risks of Departing Employees and Sensitive Data Theft

Jackson Lewis P.C. on

Insider threats continue to present a significant challenge for organizations of all sizes. One particularly concerning scenario involves employees who leave an organization and impermissibly take or download sensitive...more

A&O Shearman

Increasing insider threats and the importance of AI governance

A&O Shearman on

China’s ByteDance, the parent company of TikTok, is seeking USD1.1 million in damages from a former intern accused of sabotaging its artificial intelligence (AI) large language model training infrastructure....more

Robinson+Cole Data Privacy + Security Insider

David’s Bridal Hit with Class Actions Over Two Data Breaches

This week, two class actions were filed in the U.S. District Court for the Eastern District of Pennsylvania against David’s Bridal based on two data breaches. The actions allege that David’s Bridal failed to protect the...more

Esquire Deposition Solutions, LLC

Actionable Advice When Sharing Client Data with Vendors

We’ve previously written on the need for law firms to scrutinize the data security protections in place at all third-party vendors who have access to client confidential information. Clearly, that’s still good advice....more

BakerHostetler

Reimagining Data in the Wave of AI

BakerHostetler on

Partner Janine Anthony Bowen explores data-related issues in technology contracts in the age of GenAI....more

Bowditch & Dewey

How to Protect Your Company in the New World of AI

Bowditch & Dewey on

The new technology advancement using artificial intelligence (“AI”), ChatGPT (Chat Generative Pre-Trained Transformer) is a computer model that uses machine learning to generate relevant responses that mimic human-like...more

Health Care Compliance Association (HCCA)

Privacy Briefs: July 2023

A former hospital worker in Arizona was sentenced to 54 months in prison and ordered to pay restitution after pleading guilty to two felony counts involving identity theft and health information disclosure. In the plea deal,...more

Console and Associates, P.C.

ARx Patient Solutions Files Notice of Data Breach Affecting 41,116 Individuals Following Compromised Email Account

On June 30, 2023, ARx Patient Solutions filed a notice of data breach with the Attorney General of Maine after discovering that an employee’s M365 email account was accessed by an unauthorized party. In this notice, ARx...more

Benesch

Protecting Your Business in a Digital World: Top 10 Questions for Internal Teams and Stakeholders

Benesch on

The questions below are intended to help in-house counsel obtain the most important information related to technology projects so they can evaluate risks to the company’s data, intellectual property, and commercial interests,...more

Bass, Berry & Sims PLC

NIST Releases Public Draft of Revised Guidelines Aimed at Helping Contractors Protect Sensitive Information

Bass, Berry & Sims PLC on

On May 10, the National Institute of Standards and Technology (NIST) released its initial public draft of SP 800-171, Revision 3, a set of updated guidelines aimed at helping organizations better handle confidential...more

Venable LLP

Evaluating the Cybersecurity Risk of Your Mailing and Publishing Partners

Venable LLP on

Cybersecurity is a growing concern for all nonprofit organizations, especially those that store, process, and transmit sensitive data. While it is common to think of the cyber issue as relevant to digital communications and...more

U.S. Legal Support

[Webinar] Culture of Confidentiality: How to ensure your external vendors are mitigating cybersecurity risk - July 20th, 10:00 am...

U.S. Legal Support on

Despite strengthening security across and beyond the business, many legal organizations overlook a critical vulnerability with surprising frequency – the risk presented by third parties. Cybersecurity risk is further...more

Ankura

Implementing the Sedona Conference on Information Governance: Principles 4-6

Ankura on

The Sedona Conference is a widely known institute that is focused on the study of law and policy in many areas including Information Governance (IG). The Sedona Conference Commentary on Information Governance provides 11 IG...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, Volume 3, Issue 6

Massachusetts-Based Background Check Company Creative Services Faces Multiple Lawsuits Over Data Breach - "'CSI determined that certain files dating from November 2018 to November 2021 may have been copied from their...more

Butler Snow LLP

What Lawyers Need to Know About Cybersecurity | Dennis Van Metre | Texas Appellate Law Podcast

Butler Snow LLP on

As technology becomes more sophisticated, so too do the security issues its users encounter. These challenges impact attorneys and law firms particularly, as they regularly deal with confidential data and privileged...more

Spilman Thomas & Battle, PLLC

Protecting Employees' Private Health Information from a Cyberattack in the Age of COVID-19

With COVID-19, employers are receiving and processing an ever-increasing amount of their employees' confidential health information. From COVID-19 test results to vaccination status, many employers are routinely collecting...more

Farrell Fritz, P.C.

The Invaluable Benefits Of Multi-Factor Authentication

Farrell Fritz, P.C. on

The need to input a username and password when logging into a computer is a “single factor” authentication. But, from a security perspective, that single factor authentication only goes so far. Consider, for example, the...more

Sheppard Mullin Richter & Hampton LLP

NYDFS Issues Ransomware Guidance

The New York State Department of Financial Services recently announced new guidance addressing ransomware attacks, and highlighting cybersecurity measures to significantly reduce the risk of an attack. The guidance comes as...more

Fisher Phillips

7 Steps to Address Privacy Concerns Arising with the Remote “Invisible Workforce”

Fisher Phillips on

As remote work continues, employers have begun to characterize remote workers as the “invisible workforce” – because remote workers are not able to be seen or monitored in the same way as those performing in-person work. The...more

Fisher Phillips

New Federal Tools Can Help Private Sector Protect Trade Secrets From Cyberattacks – And May Soon Require Reporting

Fisher Phillips on

Cybersecurity was undoubtably on the forefront of the agenda for many organizations in 2020 – and 2021 should be no different. The rapid shift to remote work over the past year has led to an increased number of cybersecurity...more

Proskauer - Minding Your Business

Lessons from Wengui v. Clark Hill: Structuring a Two Track Cyber Investigation

As the D.C. District Court in Wengui v. Clark Hill recently commented, “[m]alicious cyberattacks have unfortunately become a routine part of our modern digital world. So have the lawsuits that follow them….” The court’s...more

Baker Donelson

Data Privacy Day: Top Considerations for 2021

Baker Donelson on

Happy Data Privacy Day! Since 2007, privacy professionals from across the globe have gathered together on January 28 to raise awareness about data privacy and security best practices and issues. ...more

87 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide