News & Analysis as of

Data Protection Cybersecurity

Hogan Lovells

PRODUCT | Cybersecurity and Product Liability in Technology – Cross perspectives

Hogan Lovells on

As our world has grown more connected and digitalized, and as smart, data-driven devices — including those that form the Internet of Things (IoT) — have become more prevalent, regulators have begun to reframe how they address...more

Dechert LLP

Dechert Cyber Bits - Issue 75

Dechert LLP on

Recent Rulings Could Signal Expansion of California Consumer Privacy Right of Action - Judges in two separate cases in the U.S. Northern District of California (“N.D. Cal.”) recently ruled that class actions brought by...more

Fisher Phillips

Data Security and International Travel: What K–12 Schools and Trip Chaperones Need to Know

Fisher Phillips on

As global learning experiences become more common in K–12 education, schools increasingly send staff and students abroad for cultural exchanges, academic competitions, service trips, and more. While these trips offer...more

J.S. Held

Top Ten Strategic Advantages of a vCISO with AI Expertise for Developing Business and Protecting AI Applications

J.S. Held on

In today’s fast-paced digital landscape, Artificial Intelligence (AI) is reshaping industries, unlocking new efficiencies, and enabling transformative business models. Companies leveraging AI to create applications or enhance...more

White & Case LLP

AI Watch: Global regulatory tracker - Kenya (UPDATED)

White & Case LLP on

Between January 14 and January 19, 2025, the Ministry of Information, Communications, and Technology (the "Ministry") held a consultation on a draft of Kenya's National Artificial Intelligence (AI) Strategy 2025-2030. This...more

Bradley Arant Boult Cummings LLP

A Practical Guide to Understanding Quantum Computing’s Potential Threat to Encryption

Encryption is one of several cornerstones of a robust information security program. Articles on quantum computing often include the compelling narrative that encryption is at risk, but as with any revolutionary technology,...more

McDermott Will & Emery

Privacy Framework 1.1 Gets a Tune-Up in NIST’s Latest Draft Update

McDermott Will & Emery on

On April 14, 2025, the National Institute of Standards and Technology (NIST) released a draft update to the NIST Privacy Framework 1.1. The updates are meant to enhance organizations’ data governance and risk management and...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, V 6, Issue 4, April 2025

Welcome to our fourth issue of 2025 of Decoded - our technology law insights e-newsletter. We hope you enjoy this issue and thank you for reading. Sector by Sector: How Data Breaches are Wrecking Bottom Lines - “Data...more

Fisher Phillips

Protecting Trade Secrets in the Life Sciences Industry: 8 Steps to Prevent Corporate Espionage and Theft

Fisher Phillips on

Protecting trade secrets in any business is critical, but the stakes are higher in life sciences. Given the high focus on innovation in the industry, corporate espionage can result in devastating financial and reputational...more

Dacheng

China Monthly Data Protection Update: April 2025

Dacheng on

This monthly report outlines key developments in China’s data protection sector for April....more

Troutman Pepper Locke

DOJ’s Latest Guidance on the Data Security Program – What’s New?

Troutman Pepper Locke on

The new Department of Justice (DOJ) Data Security Program (DSP) took effect on April 8....more

Kaufman & Canoles

[Event] 41st Annual Employment Law Update - May 15th, Hampton, VA

Kaufman & Canoles on

Managing risk in the employment law circus isn’t always easy when the rules change like they are contortionists. The 41st Annual Employment Law Update will highlight recent changes to the law and how employers can most...more

A&O Shearman

EC publishes draft delegated regulation on subcontracting RTS under DORA

A&O Shearman on

On March 24 2025, the European Commission (EC) adopted the final draft Delegated Regulation setting out Regulatory Technical Standards (RTS) for subcontracting ICT services supporting critical or important functions under the...more

Alston & Bird

UK Government Publishes Cyber Governance Code of Practice for Boards and Directors

Alston & Bird on

On April 8, 2025, the UK government published the Cyber Code of Practice (the “Code”) to support board directors in governing cybersecurity risks. The Code is available online. The UK’s data protection regulator is actively...more

Fisher Phillips

Protecting Data While Traveling Internationally: An Employer’s Guide for Foreign Nationals and Other Global-Traveling Workers

Fisher Phillips on

International travel may pose serious data security risks – especially for your foreign national workers carrying sensitive, proprietary, or regulated information. Travelers must be aware of potential border inspections,...more

Clark Hill PLC

Right To Know - April 2025, Vol. 28

Clark Hill PLC on

Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed. ...more

Hogan Lovells

End-to-end encryption: obstacle or pillar of national security?

Hogan Lovells on

In the face of rising cybercrime, end-to-end encryption has become a point of tension between the protection of secrets, public security, and technological sovereignty. At stake: preserving encryption as a safeguard for...more

Jones Day

EU Geopolitical Risk Update - Key Policy & Regulatory Developments No. 120

Jones Day on

This regular alert covers key policy and regulatory developments related to EU geopolitical risks, including in particular, economic security, Russia’s war against Ukraine, health threats, and cyber threats. It does not...more

Alston & Bird

UK’s Data Protection Regulator Fines a UK SaaS Provider ~$4 Million Following a Ransomware Incident

Alston & Bird on

On March 26, 2025, the UK data protection regulator (the Information Commissioner’s Office (“ICO”)) fined Advanced Computer Software Group Ltd (“Advanced”) £3.07 million (approximately $4 million). In 2022, Advanced suffered...more

Schwabe, Williamson & Wyatt PC

Low-Budget, High-Impact Ways to Reduce Privacy and Cybersecurity Risks in 2025‎

1. Know What Laws Apply to your Organization It’s not surprising many leaders are unsure about which new laws or regulations apply to their organization. Privacy and security laws, particularly in the U.S., have changed...more

Dacheng

China Monthly Data Protection Update: March 2025

Dacheng on

This monthly report outlines key developments in China’s data protection sector for March. The following events merit special attention...more

Skadden, Arps, Slate, Meagher & Flom LLP

UK GDPR Regulator Fines Data Processor After Ransomware Attack

On 27 March 2025, the UK Information Commissioner’s Office (ICO) issued a £3.07 million fine to an IT services provider following a ransomware attack in 2022 that affected the company’s health care business. The ransomware...more

Pillsbury - Internet & Social Media Law Blog

Why Your Organization Should Be Thinking About Quantum Computing and the Future of Encryption

Quantum computing (QC) is poised to disrupt cybersecurity in ways that business leaders and legal professionals cannot afford to ignore. But what exactly is quantum computing, why does it pose such a significant threat to...more

Hogan Lovells

Decrypting the Craic: The latest updates on data protection, cyber, and AI in Ireland

Hogan Lovells on

As technology continues to advance at a rapid pace, issues surrounding privacy, cybersecurity, and AI law have become increasingly prominent. In Ireland, this has sparked a series of legal developments in recent months, aimed...more

Proskauer on Privacy

The PowerSchool Breach: A Privacy Lesson on Third-Party Risk Exposure

Proskauer on Privacy on

Key Takeaways: On December 28, 2024, education technology company PowerSchool disclosed a cybersecurity breach impacting 62 million students and 9.5 million educators across the globe. The intrusion, which began on December...more

8,920 Results
 / 
View per page
Page: of 357

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide