News & Analysis as of

Data Collection Cyber Threats

Association of Certified E-Discovery...

[Webinar] Remote Mobile Discovery: Your Secret Weapon Against Malicious Insiders - April 16th, 10:00 am PDT

Malicious insiders are the silent threats lurking within organizations—employees, contractors, or partners with privileged access who can cause devastating data breaches. With the rise of remote work and mobile-first business...more

Purpose Legal

The Role of Digital Forensics Expert Witnesses

Purpose Legal on

In the digital age, the courtroom has evolved. It’s no longer just about physical evidence and eyewitness accounts. Today, digital evidence plays a crucial role in many legal proceedings. Enter the digital forensics expert...more

Segal McCambridge

The Rise of Online Abuse in Collegiate Sports: Lessons from the NCAA Threat Matrix Pilot Study

Segal McCambridge on

Online abuse in sports has reached alarming levels, targeting athletes, coaches, and officials, especially during high-profile events. Recognizing the growing threat, the National Collegiate Athletics Association (NCAA)...more

Robinson+Cole Data Privacy + Security Insider

Supreme Court to Hear TikTok Case

The United States Supreme Court announced on December 18, 2024, that it will hear the TikTok ban case and has scheduled oral arguments to be held on January 10, 2025, before the ban’s effective date of January 19, 2025....more

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part III - Digital Forensics in your Incident Response Plan - September 19th, 1:00 pm - 2:00 pm...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more

Bennett Jones LLP

B.C. Court of Appeal Finds that Allegedly Reckless Database Custodians may be Liable for "Wilful Violations" of Privacy Under the...

Bennett Jones LLP on

In a pair of decisions released on July 5, 2024, the B.C. Court of Appeal found that an alleged reckless failure to safeguard personal information may be sufficient to make out Privacy Act claims of "wilful violation" of...more

EDRM - Electronic Discovery Reference Model

Cyber Diplomacy: A New Frontier in International Relations and Professional Practice

ComplexDisocvery’s Editor’s Note: This article underscores the growing significance of cyber diplomacy in the context of global security and international relations. As cyber threats become increasingly sophisticated and...more

Health Care Compliance Association (HCCA)

Privacy Briefs: January 2024

New York has released proposed cybersecurity regulations for hospitals. The regulations, which were published in The State Register on Dec. 6 and will undergo a 60-day public comment period ending on Feb. 5, are designed to...more

Wiley Rein LLP

Intelligence Gathering and FISA Section 702: Lots of Heat Obscures Important Practical Issues

Wiley Rein LLP on

As heated debate continues over possible changes to the Foreign Intelligence Surveillance Act (FISA), which is poised to expire later this month, we wanted to provide some perspective on a few practical issues. As former DOJ...more

J.S. Held

Inside the Healthcare Industry: Understanding Emerging Data Privacy & Security Risks and Regulations

J.S. Held on

According to the Theft Resource Center and its 2022 data breach reports, data privacy and security threats are impacting all aspects of the healthcare industry – from providers to payers to medical device companies to...more

Association of Certified E-Discovery...

[Webinar] The New Professional Services Work from Home Reality and Risks - November 6th, 9:00 am - 10:30 am PST

Join us for an exciting online event that explores the challenges and risks associated with the new work from home reality in the professional services industry. Discover how professionals are adapting to remote work and...more

Association of Certified E-Discovery...

[Event] The New Professional Services Work from Home Reality and Risks - November 6th, New York, NY

Join us for an exciting in-person event at Covington & Burling LLP, New York Times Building, 8th Avenue, New York, NY 10018, USA. Discover the new reality of professional services work from home and the associated risks....more

Health Care Compliance Association (HCCA)

'Ecosystem' of Connected Devices Heightens Cybersecurity Risk

Report on Medicare Compliance 31 no. 18 (May 16, 2022) - In a version of the future that hopefully never comes, malware is able to remove malignant-looking tumors from CT or MRI scans before they were reviewed by...more

Reveal

Identifying and Protecting Data Within Your Organization is a Moving Target

Reveal on

Organizations have a lot to contend with regarding their data these days. Data is more sensitive than ever, due to ever-changing data privacy laws. Yet, it’s also under siege more than ever with an increasing number of...more

Womble Bond Dickinson

[Webinar] Moving Targets While Under Fire – Aligning with New Data Laws While Hackers and Customers Bring Pressure - April 5th,...

Womble Bond Dickinson on

In the past 5 years businesses felt the increasingly intricate data management rules (GDPR, CCPA, BIPA) pressed against an explosion in hacking and ransomware. Companies experience pressure from legislators, regulators,...more

Pietragallo Gordon Alfano Bosick & Raspanti,...

[Webinar] Privacy, Data and Cyber Security: The Current Legal Landscape - November 11th, 12:00 pm - 1:00 pm EST

Companies and consumers alike are under perpetual assault from bad actors as IoT, work from home, and cloud migration – all intended to improve productivity – have expanded the cyber attack surface. The continually evolving...more

Womble Bond Dickinson

News Scan Finds Multiple Threats to Your Privacy

Womble Bond Dickinson on

Your personal information is threatened by more pernicious tools and attacks each year. While this blog often describes poorly written privacy laws stifling business and dangerous bureaucratic overreach by privacy...more

Faegre Drinker Biddle & Reath LLP

Disruptionware VII: The Evolution of Disruptionware and the Growth of Ransomware as a Service (RaaS)

I have written multiple times about the danger of disruptionware to both Information Technology (IT) networks as well as Operational Technologies (OT) networks of victims globally. As discussed here, many different nefarious...more

NAVEX

Strengthening US Cybersecurity: Impacts of the Executive Order

NAVEX on

An executive order was signed on May 12, directing the federal government to overhaul its approach to cybersecurity. Corporate compliance and risk management professionals should consider this order carefully — because, in...more

Reveal

How to Develop An Effective Data Retention Policy

Reveal on

Every organization needs to develop an effective data retention policy to gain visibility and control over its information. But given the increasing complexity of today’s data systems and the constantly evolving regulatory...more

Bradley Arant Boult Cummings LLP

Threats, Harassment, and Contact Tracing: Why Privacy Programs are Expanding to Protect Health Care Workers

Back in March we wrote about Address Confidentiality Programs (ACPs) as the “high stakes compliance risk you probably haven’t heard of.” These state-sponsored programs were traditionally designed to protect victims of crimes...more

Akin Gump Strauss Hauer & Feld LLP

Two Note-Worthy Developments From the UK: National Data Strategy and UK-US Partnership on AI

Two developments in the United Kingdom demonstrate the country’s renewed commitment to a sustainable data strategy with appropriate privacy and security safeguards. First, on September 9, 2020, the U.K. government published a...more

Hinshaw & Culbertson LLP

Insurers Take Steps to Reduce Silent Cyber Exposure

As cyber risks continue to proliferate, issues concerning coverage for those exposures under non-cyber or "traditional" property and casualty policies are creating uncertainty for both the insurance industry and for...more

Robinson+Cole Data Privacy + Security Insider

How much is your Car Spying on You? Washington Post Hacked a Chevy Volt to Find Out

The Washington Post, as part of an investigate report, worked with a hacker to figure out what kind of information OnStar is collecting (and what data is stored in your car) on a randomly selected 2017 Chevy Volt....more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - October 2019 #5

Robinson & Cole LLP on

Energy Sector’s Reliance on IoT Increases Cyber Vulnerabilities - CyberX recently released its 2020 Global IoT/ICS Risk Report (Report), which compiles survey questions and answers from 1,821 production networks of...more

34 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide