News & Analysis as of

Cybersecurity Electronic Communications Compliance

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
WilmerHale

Why Depository Institutions, with or Without Affiliated Securities Firms, can and should Manage Employee Use of Personal Devices...

WilmerHale on

The purpose of this paper is to show how the failure to monitor for and prevent off-channel communications poses risk to traditional depository institutions that are not subject to the jurisdiction of securities-law...more

SEC Compliance Consultants, Inc. (SEC³)

Regulatory Roundup for May 2024

SEC DROPS NEW REQUIREMENT FOR INCIDENT RESPONSE PROGRAMS, PROPOSAL FOR RIAS TO ADOPT CIP, SEC EXAMS SHARES MARKETING RULE FAILURES, RIA SLAMMED FOR FAILING TO RETAIN TEXTS, AND SEC WINS ON SHADOW TRADING THEORY - Welcome to...more

Goodwin

What DORA Means for Fund Managers

Goodwin on

Q: What is DORA? “DORA” stands for the Digital Operational Resilience Act, an EU regulation that creates a new framework for the EU financial sector with regard to information and communications technology (ICT)....more

Jones Day

Considerations for Addressing DOJ’s Corporate Compliance Guidance on Mobile Devices and Messaging Platforms

Jones Day on

In light of the DOJ’s most recent guidance on the use of personal devices and third-party messaging applications by corporate personnel, this White Paper addresses issues and challenges that companies are facing in this area...more

Orrick, Herrington & Sutcliffe LLP

5 Things You Need to Know About NIS 2

On 10 November 2022, the European Parliament approved the Network and Information Security 2 Directive ("NIS 2"), moving a step closer to expanding the scope of the Network and Information Security ("NIS") Directive, the EU's...more

Reveal

5 Best Practices For Protecting Sensitive Information During An Investigation

Reveal on

Organizations are feeling the pinch of compliance like never before as government agencies at every level are scrutinizing their business affairs more closely and issuing more regulations. To meet their compliance...more

6 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide