News & Analysis as of

Cybersecurity Third-Party Today's Popular Updates

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Integreon

DORA Compliance Part 1: Proactively Meeting DORA Supply Chain Resilience Obligations

Integreon on

Introduction to DORA and its Implications - As of Jan.17, 2025, the European Union’s Digital Operational Resilience Act (DORA) became enforceable. This new regulatory framework significantly impacts financial institutions and...more

Clark Hill PLC

The Growing Cybersecurity Risks in the Cannabis Industry

Clark Hill PLC on

Those familiar with the industry know that cannabis retailers find themselves in a unique position compared to other product retailers. Cannabis retailers face significant regulatory hurdles to their operation—particularly in...more

Wiley Rein LLP

Cyber Risks and Insurance 2025 Forecast

Wiley Rein LLP on

As we prepare to close the books on another eventful year in the cyber and privacy space, Wiley’s cyber insurance team is already making predictions for 2025. Q: So, let’s get right into it – based on your experience this...more

Wiley Rein LLP

Litigation Grows Around Website Technologies, With Focus on Sensitive Data

Wiley Rein LLP on

Data privacy-related lawsuits have skyrocketed in recent years. Federal courts saw over 900 data privacy dockets in 2020 – but witnessed a surge to 1,767 dockets in 2023. At the halfway point in 2024, federal court data...more

BakerHostetler

FTC Continues Focus on Disclosure of Health Information to Third-Party Technologies

BakerHostetler on

A recently announced settlement with online alcohol addiction treatment service Monument Inc. demonstrates the Federal Trade Commission’s (FTC) continued focus on the use and disclosure of health data. The proposed settlement...more

Society of Corporate Compliance and Ethics...

Corporate Use of Third-Party Artificial Intelligence (AI) Tools

At the 2024 SCCE European Compliance & Ethics Institute, Segev Shani, Chief Compliance & Regulatory Officer at Neopharm Group will be leading the session “Corporate Use of Third-Party Artificial Intelligence (AI) Tools.” In...more

Jenner & Block

Client Alert: How Regulatory Events of 2023 Should Guide Financial Institutions' New Year's Resolutions for 2024

Jenner & Block on

As consumer-facing financial institutions of all types—from well-established banks to newly-launched fintechs—set their 2024 regulatory compliance goals, they may wonder if their New Year’s resolutions align with those that...more

King & Spalding

Global Trends in IT Outsourcing

King & Spalding on

The IT sector has been demonstrating its value in the wake of the COVID-19 pandemic. As more businesses adopt hybrid or even permanent remote work, worldwide IT spending is forecast to reach $4.5 trillion in 2022 and expand...more

Paul Hastings LLP

China Enhances Scrutiny for Cross-Border Data Transfer that would Impact Multinational Companies

Paul Hastings LLP on

1. Introduction- China’s cross-border data transfer rules are unfolding in real time and taking clearer shape. On July 7, 2022, China’s cybersecurity regulatory agency, the Cyberspace Administration of China (“CAC”), issued...more

Jackson Lewis P.C.

Construction Industry: Data Security Considerations

Jackson Lewis P.C. on

No industry is immune to privacy and cybersecurity risks, and the construction industry is no exception. Those in the construction industry can protect against a potential cyberattack by understanding the risks and...more

Troutman Pepper Locke

New FINRA Guidance Suggests Increased Scrutiny of Member Firms’ Relationships with Third-Party Vendors

Troutman Pepper Locke on

Who Needs to Know FINRA member firms. - Why It Matters On August 13, the Financial Industry Regulatory Authority released a regulatory notice to member firms, clarifying their existing obligations on the supervision of...more

Dentons

Even the DOL is Issuing Cybersecurity Instructions

Dentons on

In April, the Department of Labor, specifically the Employee Benefits Security Administration, issued cybersecurity guidance to assist in protecting “the retirement benefits of America’s workers.”  This guidance falls neatly...more

Cozen O'Connor

Water Filtration Retailer Settles Allegations Stemming From 2019 Data Breach

Cozen O'Connor on

New York AG Letitia James reached a settlement with online water filtration retailer Filters Fast LLC to resolve allegations that it failed to protect customers’ payment card information in a 2019 data breach in violation of...more

Fox Rothschild LLP

FTC Fines Kids’ App Developer For COPPA Violations

Fox Rothschild LLP on

The FTC has fined an app developer for failure to acquire parental consent for sharing online identifiers for use for targeted advertising. A developer of apps that are popular with children has agreed to pay $150,000 and to...more

Bricker Graydon LLP

FTC announces new and improved data security guidance

Bricker Graydon LLP on

On January 6, 2020, Andrew Smith, Director of the Federal Trade Commission (FTC) Bureau of Consumer Protection, announced three significant improvements to the FTC’s approach to data security enforcement cases....more

BakerHostetler

Steps to Develop a Mature Third-Party Risk Management Program With High-Risk Third Parties (Part 3)

BakerHostetler on

This blog is the third in a series exploring how organizations can prevent or mitigate the severity of a third-party data breach or cyber exploit by implementing a variety of cybersecurity risk management controls, such as...more

BakerHostetler

Steps to Develop a Mature Third-Party Risk Management Program with High-Risk Third Parties (Part 2)

BakerHostetler on

This blog is the second in a series exploring how organizations can prevent or mitigate the severity of a third-party data breach or cyber exploit by implementing a variety of cybersecurity risk management controls, such as...more

Latham & Watkins LLP

China Issues New Cybersecurity Law to Protect Children

Latham & Watkins LLP on

China’s PCPPIC protects children’s personal information in much the same way as COPPA and the GDPR, but with a few differences. On August 22, 2019, the Cyberspace Administration of China (CAC) released a new data privacy...more

Jackson Lewis P.C.

Should Companies Terminate Third Party Vendors That Cause A Data Breach?

Jackson Lewis P.C. on

According to reports, bank customers in Australia (yes, data breach notification requirements exist down under) have been affected by “an industry-wide” data breach experienced by a third-party service provider to the banks –...more

Foley & Lardner LLP

Ringing in 2019 with New State Privacy and Data Security Laws Impacting Data Brokers and Insurers

Foley & Lardner LLP on

New state laws that took effect January 1, 2019, likely will have a broader impact on how U.S. companies collect, process, and secure consumers’ personal information, in addition to how and when they report data breaches....more

NAVEX

Vendor Risk & Data Security: Why Is This So Hard?

NAVEX on

Studies about vendor risk related to data security always fascinate me, because conceptually those risks are so similar to the vendor risk challenges corporate compliance officers face with anti-corruption — and yet, the...more

Skadden, Arps, Slate, Meagher & Flom LLP

Privacy & Cybersecurity Update - October 2018

In this month's edition of our Privacy & Cybersecurity Update, we examine the European Data Protection Board's published opinions on data protection impact assessments, an Ohio court's ruling that bitcoin is covered insured...more

Steptoe & Johnson PLLC

First Look - Summer 2018: Insurance Newsletter

Steptoe & Johnson PLLC on

Your company’s computer system has been compromised by a hacker. From your initial investigation, you discover that the hacker has accessed proprietary company information and customer information including Social Security...more

Alston & Bird

SEC Prioritizes Data Security and Expects More Mature Cybersecurity Programs

Alston & Bird on

Investment advisers and broker-dealers can expect more scrutiny of their data security from the Securities and Exchange Commission. Our Cybersecurity Preparedness & Response and Investment Management, Trading & Markets teams...more

Proskauer - Blockchain and the Law

When Smart Contracts are Outsmarted: The Parity Wallet “Freeze” and Software Liability in the Internet of Value

The recent Parity wallet “freeze” provides yet another example of a coding vulnerability in a smart contract (rather than a flaw in the underlying blockchain or cryptography) resulting in an exploit that compromises...more

31 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide