News & Analysis as of

Data Privacy Compliance

The Data Report Episode 19: Data Security Regulations in China & Russia

by Bilzin Sumberg on

Module Five: International Law (Part IV) In this episode of The Data Report, Litigation attorney Jay Ward discusses two other big players in the international data security scene, Russia and China. Jay begins by discussing...more

The Data Report Episode 18: Privacy Shield

by Bilzin Sumberg on

Module Five: International Law (Part III) In this episode of The Data Report, Litigation attorney Jay Ward discusses compliance with the GDPR requirements. Jay examines "Privacy Shield," the framework that provides a set of...more

Implementing China’s Cybersecurity Law

by Jones Day on

China’s Cybersecurity Law was issued on November 7, 2016, by the Standing Committee of the National People’s Congress, and it came into effect on June 1, 2017. The Cybersecurity Law marks the first comprehensive law in China...more

The Data Report Episode 2: Data Security Is More Than an IT Issue

by Bilzin Sumberg on

Data security isn’t only about technology or privacy; it’s also about consumer law. Litigation attorney Jay Ward discusses the growing number of companies facing enforcement actions over failing to safeguard their customers'...more

One Month to Better Investigations and Reporting-Day 10-Best Practices in a Cross-Border Investigation

by Thomas Fox on

Description: Mara Senn and a colleague, Michelle Albert, published in the FCPA Report, Volume 3, Number 1, entitled “Internal Investigations, How to Conduct an Anti-Corruption Investigation: Developing and Implementing the...more

Value-based health care: data & technology

by Ropes & Gray LLP on

Ira Parghi, Ropes & Gray health care counsel, discusses the increasing role that data and technology will play in a value-based health care world. __ There’s a lot going on when it comes to technology and health care. We...more

Day 1 of One Month to Better Investigations and Reporting-Introduction to Investigations and Internal Reporting

by Thomas Fox on

The call, email or tip comes into your office; an employee reports suspicious activity somewhere across the globe. That activity might well turn into a Foreign Corrupt Practices Act (FCPA) issue for your company. As the Chief...more

Self-Sovereign Identity and Distributed Ledger Technology : Framing the Legal Issues

by Perkins Coie on

Purpose - Distributed ledger technology (“DLT”), including the use of blockchain technology, has been touted as a way to create and validate digital identities that serve many of the same purposes that physical forms of...more

Data Privacy and Security – What is the Difference?

by Michael Volkov on

The terms “Data Privacy and Security” are being thrown around a lot lately. Just recently, England’s health services and medical facilities were shut-down and the target of a ransom note (demanding, of course, payment in...more

FCPA Compliance Report-Episode 326, Paula Long On The Intersection Of Data Security And Compliance

by Thomas Fox on

In this episode I caught up with Paula Long, founder and CEO of DataGravity, Inc. at the recently concluded Collision 2017 Conference. Paula has worked in the data and information space for over 30 years and now helps...more

What Compliance Needs to Know About Data Privacy and Security

by Michael Volkov on

You don’t have to be a tech-savvy computer genius to address the basics of data privacy. Like many areas which compliance departments oversee, asking the right question and getting the right internal controls in place are the...more

FCPA Compliance Report-Episode 304-Brad Davis on Data Security, Data Privacy and Information Governance

by Thomas Fox on

In this episode I visit with Brad Davis, founder and CEO of TechIttoMe, a data and information governance firm. It assists clients with data privacy, security and other facets of information government. Brad discusses...more

Lessons Learned From FCPA Enforcement Against JP Morgan for Sons and Daughters Referral Program

by Michael Volkov on

Last week, the Justice Department and the SEC finally brought to a close the Sons and Daughters or Princelings investigation. Pending investigations against four other companies still remain to be resolved....more

Battle of the Somme Week – Part III: Lessons from Brexit

by Thomas Fox on

There have been a plethora of new books about the Battle of the Somme. Daniel Todman reviewed several in an article for the Financial Times (FT), entitled “Stories of the Somme”. One of the books reviewed, Breakdown: The...more

[Webinar] Cloud licensing and health care data: Know the risks, learn the solutions - July 13th, 12:00pm CT

by Thompson Coburn LLP on

As identity theft and malicious attacks against clinical providers increase, more and more health care data is stored in the digital cloud. The health care industry is required to take special precautions when licensing...more

Tribute to David Bowie and VW’s Cooperation Posture

by Thomas Fox on

We interrupt this week’s Travel Edition blog posts to honor David Bowie, who died yesterday. To say his album Diamond Dogs was a revelation is simply because it is the only word which comes close. During my final semester in...more

2016 Trends #2: Transitioning to a More Global Center of Gravity for Ethics and Compliance

by NAVEX Global on

Today, many ethics and compliance professionals, no matter where we’re located, find it to be important to keep up-to-date on the latest news from the European Union courts, the U.K.’s Serious Fraud Office and international...more

Focus on China - October 2015

by McDermott Will & Emery on

Welcome to the third issue of Focus on China Compliance for 2015. According to the FCPA Blog’s October 2015 Corporate Investigations List, China leads the countries reported to be involved in FCPA investigations with 29...more

Eye of the Storm: Be Prepared for Cross-Border Data Compliance Ahead of the January 1 Deadline

by Exterro, Inc. on

The eye at the center of a hurricane is the calmest part of the storm. Winds subside. Blue skies appear. A sense of relief falls over everyone because the immediate danger seems to have passed. But one of the biggest...more

[Webinar] Managing Risk in the Era of Cyber Insecurity - Oct. 27th, 1:00 CST

by Robins Kaplan LLP on

Join privacy and data security attorney Richard Martinez for this informative session that will break down the details of the 50 leading enforcement actions taken by the FTC to regulate data privacy and cyber security. By...more

OCR portal designed for medical mobile app developers

The Office for Civil Rights (OCR) of the Department of Health and Human Services has launched a web based portal so medical mobile app developers can ask their “burning” questions about HIPAA compliance....more

Privacy, Security, Risk: What You Missed At IAPP Conference

by Orrick - Trust Anchor on

Earlier this month, privacy and security professionals from around the globe gathered for “Privacy. Security. Risk. 2015”—the second joint conference between the International Association of Privacy Professionals and the...more

OIG Reports Insufficient Oversight Of HIPAA Compliance

by King & Spalding on

The HHS Office for Civil Rights (OCR) must improve its oversight and enforcement of patient information privacy and security rules by “covered entities” and their business associates under the Health Information Portability...more

Is Your HIPAA Compliance Program Ready for the FTC?

by Womble Bond Dickinson on

Everyone in healthcare knows that the next round of HIPAA audits is coming. Covered entities and business associates have long been advised to review and update their HIPAA security risk analyses, have business associate...more

Dodd-Frank Executive Compensation Update: SEC Adopts CEO Pay Ratio Disclosure Rules

by Perkins Coie on

The Securities and Exchange Commission (SEC) recently adopted final rules implementing one of the last four remaining executive compensation requirements under the Dodd-Frank Wall Street Reform and Consumer Protection Act. ...more

50 Results
|
View per page
Page: of 2
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.