News & Analysis as of

Data Collection Cyber Attacks

IR Global

New risks, new rewards - The Visionaries

IR Global on

The productivity paradox: Does more technology mean less growth? Nobel Prize-winning economist Robert Solow famously remarked, “You can see the computer age everywhere except in the productivity statistics.” This paradox...more

Clark Hill PLC

Right To Know - November 2024, Vol. 23

Clark Hill PLC on

Cyber, Privacy, and Technology Report - Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed....more

Cozen O'Connor

NYDFS Issues Guidance on Cybersecurity Risks Arising from Artificial Intelligence

Cozen O'Connor on

On October 16, 2024, the New York Department of Financial Services (NYDFS) issued an Industry Letter that discusses the cybersecurity risks associated with the use of artificial intelligence (AI) and outlines strategies to...more

Ward and Smith, P.A.

Three Cybersecurity Mistakes Small Businesses Make: A Data Privacy Attorney's Perspective

Ward and Smith, P.A. on

In today's digital landscape, where data and technology are integral to business, companies of all sizes are prime targets for cyberattacks. As privacy and data security attorneys, we see the severe impact of inadequate...more

Wiley Rein LLP

After the Cyberspace Solarium Commission’s Successful Run, What’s Left to Do?

Wiley Rein LLP on

On September 19, 2024, U.S. Senator Angus King (D-ME); Rear Admiral (retired) Mark Montgomery, Senior Director and Senior Fellow of the Foundation for Defense of Democracies’ Center on Cyber and Technology Innovation; and...more

Bennett Jones LLP

B.C. Court of Appeal Finds that Allegedly Reckless Database Custodians may be Liable for "Wilful Violations" of Privacy Under the...

Bennett Jones LLP on

In a pair of decisions released on July 5, 2024, the B.C. Court of Appeal found that an alleged reckless failure to safeguard personal information may be sufficient to make out Privacy Act claims of "wilful violation" of...more

EDRM - Electronic Discovery Reference Model

Cyber Diplomacy: A New Frontier in International Relations and Professional Practice

ComplexDisocvery’s Editor’s Note: This article underscores the growing significance of cyber diplomacy in the context of global security and international relations. As cyber threats become increasingly sophisticated and...more

Pagefreezer

The 2024 ESI Risk Management & Litigation Readiness Report

Pagefreezer on

New study finds legal departments struggling to manage electronically stored information (ESI), resulting in delays and fines. Review the key findings from the 2024 ESI Risk Management & Litigation Readiness Report....more

King & Spalding

Department of Homeland Security Proposes Rule for Reporting of Cyber Incidents

King & Spalding on

On April 4, 2024, the Cybersecurity and Infrastructure Security Agency (“CISA”) published for public comment a long-awaited proposed rule to implement the Cyber Incident Reporting for Critical Infrastructure Act of 2022...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Emerging Theories of Liability in the Internet of Things Era

The Internet of Things (“IoT”) has ushered in a new era of connectivity and convenience, but with it comes a host of legal issues and emerging theories of liability. As IoT devices become increasingly ubiquitous in our daily...more

Blank Rome LLP

The BR Privacy & Security Download: February 2024

Blank Rome LLP on

Welcome to this month's issue of The BR Privacy & Security Download, the digital newsletter of Blank Rome’s Privacy, Security & Data Protection practice....more

Mitratech Holdings, Inc

5 GRC Trends and Resolutions for a More Secure 2024

Elevate your resilience in the new year by understanding top GRC trends, patterns, and best practices across AI, TPRM, cyber risk, and more. As we step into 2024, technological advancements and an increasingly connected —...more

J.S. Held

Inside the Healthcare Industry: Understanding Emerging Data Privacy & Security Risks and Regulations

J.S. Held on

According to the Theft Resource Center and its 2022 data breach reports, data privacy and security threats are impacting all aspects of the healthcare industry – from providers to payers to medical device companies to...more

Foley Hoag LLP

FBI and CISA Issue Advisory on Scattered Spider Ransomware Attacks

Foley Hoag LLP on

Large companies holding sensitive data – including financial services, telecommunications, business process outsourcing, hospitality, and cryptocurrency firms – as well as their IT helpdesks, are increasingly being targeted...more

Morrison & Foerster LLP

Top 5 SEC Developments (October 2023)

Morrison & Foerster LLP on

Each month, we publish a roundup of the most important SEC enforcement developments for busy in-house lawyers and compliance professionals. This month we examine: • Fraud and internal control failure charges against...more

Health Care Compliance Association (HCCA)

Privacy Briefs: November 2023

Report on Patient Privacy 23, no. 11 (November, 2023) The American Hospital Association (AHA) is urging federal lawmakers to intervene with the HHS Office for Civil Rights (OCR) so that hospitals and health systems can...more

Reveal

[Webinar] Declutter Your Data: Strategies for Efficient Data Retention & Risk Reduction - October 25th, 1:00 pm - 2:00 pm ET

Reveal on

In an era where data is often referred to as the “new oil,” an abundance of it can lead to unexpected challenges. Back in 2012, IDC estimated that information workers spent an average of 9.4 hours per week simply sifting...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 9, September 2023

Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more

Robinson+Cole Data Privacy + Security Insider

Advocate Aurora Health to Pay $12.25 Million Settlement for Data Breach Class Action

In October 2022, Advocate Aurora Health notified 3 million individuals of a data breach resulting from its use of tracking pixels on its website for tracking website visitor activity. Now, this month, Advocate Aurora Health...more

Mitratech Holdings, Inc

The Rise of Artificial Intelligence (AI) in GRC: Trends and Use Cases

Emerging developments in AI, Machine Learning, Natural Language Processing, Automation, and More – Where Does it All Fit Inside the World of GRC? AI-driven technology has been making headlines for breakthroughs as well as...more

Troutman Pepper Locke

EDVA Judge Dismisses Data Breach Class Action for Lack of Article III Standing

Troutman Pepper Locke on

The modern “Information Age” has been defined by rapidly increasing interconnectivity and dependence on the internet by consumers and businesses alike. One side effect of these technological advances has been the increasing...more

Bennett Jones LLP

The Ontario Court of Appeal Confirms the Narrow Confines of the Tort of Intrusion Upon Seclusion

Bennett Jones LLP on

2022 continued to be positive for institutional clients involved in privacy breach class actions, with the Ontario Court of Appeal refusing to expand the tort of intrusion upon seclusion to impose liability on institutions...more

Health Care Compliance Association (HCCA)

Privacy Briefs: May 2023

Five former Memphis-based hospital employees and another man have pled guilty to unlawfully disclosing patient information in violation of HIPAA, U.S. Attorney for the Western District of Tennessee Kevin Ritz announced....more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

Spilman Thomas & Battle, PLLC

Tech Vendors and Cybersecurity – Are They Responsible?

It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you if its product is compromised and results in a data...more

106 Results
 / 
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide