News & Analysis as of

Cybersecurity Risk Management Confidential Information

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Paul Hastings LLP

NFL Draft Provides Wake-Up Call on Protecting Confidential Information While Working Remotely

Paul Hastings LLP on

Last week’s NFL draft highlighted more than the accomplishments of athletes at the combine or on the field. While there was extensive coverage of the merits of each player, one of the major headlines coming out of the draft...more

Wolf, Greenfield & Sacks, P.C.

Spring Cleaning and Tune-up for Your Trade Secret Portfolio: Eight Steps

Spring has arrived, and in addition to cleaning, it’s a good time to reassess how your company is handling its trade secrets. Far from being static, trade secret innovations, processes, and data evolve over time. Business...more

U.S. Legal Support

Security Best Practices for Remote Depositions in the Digital Age

U.S. Legal Support on

Trial outcomes often hinge on witness testimony. Attorneys collect much of this testimony during a formal process called a deposition. A critical component of discovery, depositions traditionally occur in law offices or...more

Littler

Considerations for Artificial Intelligence Policies in the Workplace

Littler on

In recent years, many organizations have implemented new policies on artificial intelligence (AI) use to help prevent bias, plagiarism, or use of AI tools that produce inaccurate or misleading information. Meanwhile, many...more

Venable LLP

Understanding Trade Secret Laws and Assets

Venable LLP on

For companies, maintaining a competitive advantage over the market is necessary for long-term growth. In many cases, this competitive advantage takes the form of a federal- or state-protected trade secret, such as a...more

U.S. Legal Support

Best Practices to Secure Law Firm Documents

U.S. Legal Support on

Law firms handle confidential information and documents that require diligent protection. The stakes are high, the regulations and their sources are vast, and technology is sophisticated and ever-changing....more

Jackson Lewis P.C.

Insider Threats: The Overlooked Risks of Departing Employees and Sensitive Data Theft

Jackson Lewis P.C. on

Insider threats continue to present a significant challenge for organizations of all sizes. One particularly concerning scenario involves employees who leave an organization and impermissibly take or download sensitive...more

Procopio, Cory, Hargreaves & Savitch LLP

3 Steps to Protect Highly Sensitive Assets in an M&A Deal

Due diligence is a necessary part of any M&A transaction. This process can be an exhaustive deep dive into the target company’s history. In some cases, the buyer wants to assure itself of certain highly confidential and...more

A&O Shearman

Increasing insider threats and the importance of AI governance

A&O Shearman on

China’s ByteDance, the parent company of TikTok, is seeking USD1.1 million in damages from a former intern accused of sabotaging its artificial intelligence (AI) large language model training infrastructure....more

Baker Donelson

Guardians of the Goldmine: Building an Effective Confidentiality Program

Baker Donelson on

On August 14, Judge Corrigan for the Middle District of Florida, in Properties of the Villages vs. FTC, found that the FTC did not have the authority to enter its planned Noncompete Rule, and entered an order granting an...more

Sheppard Mullin Richter & Hampton LLP

NY State Bar Association Joins Florida and California on AI Ethics Guidance – Suggests Some Surprising Implications

The NY State Bar Association (NYSBA) Task Force on Artificial Intelligence has issued a nearly 80 page report (Report) and recommendations on the legal, social and ethical impact of artificial intelligence (AI) and generative...more

Spilman Thomas & Battle, PLLC

HHS Cybersecurity Performance Goals and the Healthcare Industry

The healthcare industry is a major target for cyberattacks because of all of the personal information collected from patients. Recognizing that the healthcare industry is such a ripe hunting ground for cybercriminals, the...more

Jackson Lewis P.C.

Dealing With the Growing Threat of Cyberattacks in Manufacturing Sector: What Employers Need to Know

Jackson Lewis P.C. on

For the second year in a row, the manufacturing industry has fallen victim to more cyberattacks than any other major business sector. Indeed, according to IBM Security’s X-Force Threat Intelligence Index, nearly 25 percent...more

Benesch

Protecting Your Business in a Digital World: Top 10 Questions for Internal Teams and Stakeholders

Benesch on

The questions below are intended to help in-house counsel obtain the most important information related to technology projects so they can evaluate risks to the company’s data, intellectual property, and commercial interests,...more

U.S. Legal Support

[Webinar] Culture of Confidentiality: How to ensure your external vendors are mitigating cybersecurity risk - July 20th, 10:00 am...

U.S. Legal Support on

Despite strengthening security across and beyond the business, many legal organizations overlook a critical vulnerability with surprising frequency – the risk presented by third parties. Cybersecurity risk is further...more

Ervin Cohen & Jessup LLP

Mitigating a Company’s Liability When a Data Breach Is Suffered by a Vendor or Service Provider

Data breaches by large companies have been in the news for some time. Over the last several years several companies, including Marriott, Yahoo and Volkswagon, have been victimized by hackers who have broken into a company’s...more

Esquire Deposition Solutions, LLC

Lawyers Encouraged to Vet Tech Vendors Carefully

Law firms are prime targets for hackers. Why? Because their computer networks contain highly concentrated, high-value information about many parties that is often not well-protected. One often-overlooked vulnerability is the...more

Pullman & Comley, LLC

ABA Ethics Committee Weighs in on Practicing Law Virtually

Pullman & Comley, LLC on

In  Formal Opinion 498, issued on March 10, 2021, the American Bar Association’s Standing Committee on Ethics and Professional Responsibility has provided some guidance on the ethical obligations triggered when a lawyer...more

Baker Donelson

Data Privacy Day: Top Considerations for 2021

Baker Donelson on

Happy Data Privacy Day! Since 2007, privacy professionals from across the globe have gathered together on January 28 to raise awareness about data privacy and security best practices and issues. ...more

Mitratech Holdings, Inc

Managing Third-Party Vendor Regulatory Compliance

Data breaches are a hot topic and will undoubtedly get even hotter. Cybersecurity for your own enterprise isn’t enough — you must evaluate your vendors and determine if they’re prepared to resist cyberattacks.  ...more

K&L Gates LLP

COVID-19: Navigating the New Norm: A Legal Perspective

K&L Gates LLP on

HOW DID WE GET HERE? Business leaders are grappling with challenges which are unprecedented and which have not been witnessed on such a global scale previously. As COVID-19 spreads across the world, governments reacted by...more

Bass, Berry & Sims PLC

Privacy Perils: Trial Separation

Bass, Berry & Sims PLC on

For those with school age children, working from home now also means learning from home. In addition to your personal web surfing and emailing, separate your kids’ online school activities from a work-issued laptop and...more

Goodwin

Practical Steps to Reduce Cybersecurity Risks During COVID-19

Goodwin on

Cybercriminals love a crisis and COVID-19 is no different. In the last several weeks, cyber-crime has increased exponentially as hackers seek to take advantage of the migration to a remote workplace. As cybercriminals seek to...more

King & Spalding

Energy Newsletter - April 2020

King & Spalding on

Developing Contingency Plans: The NYDFS Mandate on Licensed Virtual Currency Businesses - The events surrounding COVID-19 have increased the use of fintech products, both out of necessity and convenience. Shelter-in-place...more

Nutter McClennen & Fish LLP

COVID-19 Security Alert: 10 Reminders for Employees Working Remotely

The security and confidentiality of a company’s data is paramount. As businesses grapple with the COVID-19 pandemic and the need for employees to work remotely, it is important to remain focused on ensuring the security and...more

40 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide