Back to School: 3 Essential Employee Trainings
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
Safeguard your Business: Dinsmore's Craig Horbus on Combatting the Rising Threat of ACH Fraud
The Privacy Insider Podcast Episode 4: Don't Be Evil: In the Hot Seat of Data Privacy, Part 1
It's Time to Think About Data Mapping Differently
The American Privacy Right Act (APRA) explained
Navigating the Regulation Jungle: How to Be Compliant, Work Efficiently, and Stay Sane
Legal Alert | Wiretap Laws in the United States
Business Better Podcast Episode: Cyber Adviser – A Comparison of AI Regulatory Frameworks
Preventative Medicine: Health Care AI Privacy and Cybersecurity — The Good Bot Podcast
Cost of Noncompliance: More Than Just Fines
Will the U.S. Have a GDPR? With Rachael Ormiston of Osano
No Password Required: MITRE Engage Lead, Innovator in Cyber Deception, and Dance Community Builder
Navigating State Privacy Laws: A Conversation with Oregon & Texas Regulators about Privacy Enforcement
The Team Continues to Grow: A Conversation With Our Newest Colleague, Kaitlin Clemens — Unauthorized Access Podcast
Episode 326 -- Dottie Schindlinger on Diligent's Report on Board Oversight of Cybersecurity Risks and Performance
[Webinar] Midyear Data Privacy Check-in: Trends & Key Updates
Decoding Privacy Laws: Insights for Small to Mid-Sized Businesses — Regulatory Oversight Podcast
No Password Required: Education Lead at Semgrep and Former Czar for Canada’s Election Security
Navigating State Privacy Laws
Sweepstakes promotions can be valuable tools for businesses seeking to attract new customers. Unlike static ads, newsletter sign-ups and other basic website registration forms, sweepstakes incentivize consumers to provide...more
Unauthorized Access, Troutman Pepper's privacy and cybersecurity-focused podcast, spotlights the human aspect of the cybersecurity industry, introducing you to the remarkable personalities that make the industry amazing....more
Startups face unique challenges that can impact their success and sustainability. Obstacles such as financial constraints (inadequate funding or limited cash flow) and resource constraints often result in small teams having...more
On July 28, 2023, the CNIL published a call for contributions focusing on the creation of databases based on artificial intelligence. All stakeholders in the sector are invited to participate and share their experiences and...more
Blockchain technology is widely anticipated to disrupt major industries and business operations over the next several years. But with all of the “hype” in the blockchain market, at times it can be difficult to separate fact...more
Medical data companies are reportedly volunteering to join the fight against COVID-19 by offering to broadly share confidential, HIPAA-protected patient medical information they possess, including patient demographics,...more
On March 5, 2020, Vermont Governor Phil Scott signed into law Senate Bill 110, “An act relating to data privacy and consumer protection,” which provides authority to develop a statewide data privacy inventory of the...more
Cyberliability insurance provider Beazley Insurance Company has analyzed its internal breach response data and determined that in its experience, there has been a thirty-seven percent (37%) increase in ransomware attacks this...more
More than a year ago, in April 2018, police announced that they had used a new investigative technique to arrest a man known as the Golden State Killer. For the first time, the police submitted DNA from a crime scene into a...more
Companies are reminded that during the first 15 labor days of August claims by holders must be submitted before Colombia's Superintendence of Industry and Commerce (SIC) for the first semester of 2019... Please find below...more
Last week, the U.S. Department of Justice (DOJ) issued a notice of proposed rulemaking in the Federal Register moving to exempt the FBI’s biometrics database from the notice and consent provisions of the Privacy Act of 1974...more
As discussed in a previous post on facial recognition technology, a putative class action has been filed against Facebook over the collection of “faceprints” for its online photo tagging function, Tag Suggestions. (See e.g.,...more
On September 14, 2015, the OIG released a Public Summary Report finding that although CMS had implemented controls to secure the Multidimensional Insurance Data Analytics System (MIDAS) and consumer personally identifiable...more
Since our last blog post about the OIG’s work plan, the work plan has been updated as of August 7, 2015 to add four new projects. A newly added ongoing project is a “Security Control Review of the CFPB’s SQL Environment.” (An...more