News & Analysis as of

Data Protection Risk Management Technology

Bradley Arant Boult Cummings LLP

A Practical Guide to Understanding Quantum Computing’s Potential Threat to Encryption

Encryption is one of several cornerstones of a robust information security program. Articles on quantum computing often include the compelling narrative that encryption is at risk, but as with any revolutionary technology,...more

Baker Botts L.L.P.

AI Legal Watch - DeepSeek Under Scrutiny

Baker Botts L.L.P. on

Everyone is talking about DeepSeek for its increase performance and efficiency. However, with that comes additional risks, as DeepSeek is subject to Chinese national law, and there are still many unanswered questions...more

Lighthouse

A Less is More Strategy for Data Risk Mitigation

Lighthouse on

With new collaboration features, AI tools, and work technology developing at a dizzying pace, we know that the volume of data organizations must manage will only increase faster. What are the risks and costs involved with...more

Kilpatrick

5 Key Takeaways | Managing the Risks in Using Generative AI or How I Learned to Stop Worrying and Love AI

Kilpatrick on

Kilpatrick's Steve Borgman and Jordan Glassman recently presented on the various generative AI technologies available, with an emphasis on large language models such as ChatGPT (and others that are similar), at Kilpatrick’s...more

NAVEX

Artificial Intelligence and Compliance: Preparing for the Future of AI Governance, Risk, and Compliance 

NAVEX on

Artificial Intelligence has rapidly moved from theoretical to transformational, profoundly changing how businesses operate across industries. While the benefits of AI, particularly Generative AI (genAI), are monumental, these...more

Baker Botts L.L.P.

What is DeepSeek, and why does it matter?

Baker Botts L.L.P. on

Everyone seems to be talking about DeepSeek, and its latest AI technologies. But what is DeepSeek? What has it produced? And why is everyone talking about them? This client update is intended to provide some of the basic...more

Foley & Lardner LLP

2023 AI Executive Order Revoked

Foley & Lardner LLP on

On January 20, 2025, President Donald Trump signed an executive order rescinding the 2023 directive issued by former President Joe Biden on artificial intelligence (AI). Biden’s order outlined extensive measures aimed at...more

Opportune LLP

Top Data Conversion Methods to Streamline RightAngle…

Opportune LLP on

Properly converting, transforming, creating a backup, and formatting data is essential for a successful ION RightAngle implementation. Just as a solid foundation is critical for constructing a lasting building, clean,...more

A&O Shearman

CFTC Issues Advisory Guidance For Anticipated Growth In Use Of Artificial Intelligence By Regulated Entities

A&O Shearman on

On December 5, 2024, the Divisions of Clearing and Risk, Data, Market Oversight, and Market Participants of the Commodity Futures Trading Commission (“CFTC”) issued an advisory on the use of artificial intelligence (“AI”) in...more

Health Care Compliance Association (HCCA)

AI is here to stay?

Artificial intelligence or AI—yes, we are talking about it again. The explosion of AI in healthcare will only continue to grow. Statistics show that the total market value of AI in healthcare will expand to over $148 billion...more

IR Global

New risks, new rewards - The Visionaries

IR Global on

The productivity paradox: Does more technology mean less growth? Nobel Prize-winning economist Robert Solow famously remarked, “You can see the computer age everywhere except in the productivity statistics.” This paradox...more

Health Care Compliance Association (HCCA)

HHS Abandons Appeal in Public Website Pixel Case, But CEs and BAs Should Expect Continued Scrutiny

The HHS Office for Civil Rights (OCR) has abandoned its appeal of a federal judge’s ruling overturning OCR’s guidance prohibiting covered entities (CEs) and business associates (BAs) from using the web-tracking technologies...more

Osano

[Webinar] AI and Data Privacy: Minimizing Risk and Maximizing Opportunity

Osano on

Artificial intelligence is going to transform how the world does business — and in order to harness that transformation for the better, businesses need to be proactive about mitigating risks. When it comes to managing AI risk...more

McDermott Will & Emery

Special Report: Understanding ONC’s Health AI Transparency and Risk Management Regulatory Framework

McDermott Will & Emery on

The Health Data, Technology, and Interoperability: Certification Program Updates, Algorithm Transparency, and Information Sharing (HTI-1) final rule, issued by the US Department of Health and Human Services (HHS) Office of...more

Woods Rogers

Overview of Virginia’s AI Executive Order

Woods Rogers on

In January 2024, Virginia Governor Glenn Youngkin announced and signed Executive Order 30 on Artificial Intelligence (EO 30), establishing “important safety standards to ensure the responsible, ethical, and transparent use of...more

Spilman Thomas & Battle, PLLC

The Academic Advisor - Education Law Insights, Issue 9, November 2023

The Accreditation Overhaul for North Carolina (and Florida) Colleges - Last month, North Carolina Governor Roy Cooper signed House Bill 8 (HB 8) into law. In addition to establishing a new computer science requirement for...more

Health Care Compliance Association (HCCA)

Artificial intelligence: Compliance considerations for provider organizations

Artificial intelligence (AI) is nothing new to the healthcare industry, as many organizations and clinicians have utilized such tools in some capacity for many years. Imaging-related AI to support radiologists is not...more

Foley Hoag LLP - Security, Privacy and the...

If Your Password Is On This List, It’s Time to Change It

It’s been several years since I have written about password hygeine. I have been hoping that a better security solution would be widely adopted and while I hear rumors in that regard, passwords still reign supreme. So when I...more

J.S. Held

Cyber Hygiene in 2023: Part 2 – Cyber Hygiene for Remote and Hybrid Workforce

J.S. Held on

In the first part of this mini-series, we identified that showing everyday users how to secure data may not be as important as highlighting why data security matters. The “why” helps everyday users appreciate and internalize...more

White & Case LLP

Cybersecurity Developments and Legal Issues

White & Case LLP on

For most large companies, a frictionless flow of information and the ability to transfer customer data, employee files, financial records and other information around the world quickly and cost-effectively is a critical...more

J.S. Held

Cyber Hygiene in 2023: Part 1 – Getting Buy-In from Users

J.S. Held on

As we progress through 2023, both new and old cyber challenges remain, but opportunities for improvement are present. For the upcoming year, assume the following: 1. Past challenges have not been overcome, and we still...more

Reveal

6 Data Governance Principles Corporate Leaders Should Apply in 2023

Reveal on

The amount of data that corporations must manage is larger now than it has ever been—and the growth trend shows no signs of slowing down. Data is essential to corporate operations and growth, but overseeing and protecting it...more

Ankura

Outsourcing Services: An Increasingly Common Origin for Insider Threats in the Supply Chain

Ankura on

1 42 On May 10, 2022, a former Coca-Cola chemist was sentenced to 14 years in prison for selling trade secrets to a Chinese government-backed corporation. This example demonstrates the way the supply chain increasingly...more

Woods Rogers

Why You Need MFA Setup For Your Business

Woods Rogers on

Creating passwords needs to be a challenge, not for you to remember but for others to guess. Yet, the digital world is changing. A single sign-on password is pretty easy for unsavory characters to hack. Statistics indicate in...more

Faegre Drinker Biddle & Reath LLP

FTC Warns Companies to Fix Vulnerabilities Associated with Log4j

The Federal Trade Commission (FTC) recently warned private entities to remediate any ongoing Log4j vulnerabilities present within their networks or face possible enforcement action....more

25 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide