News & Analysis as of

Data Protection Vendors

Seyfarth Shaw LLP

CPPA Underscores That Businesses Own CCPA Compliance – Even When Privacy Management Tools Fail

Seyfarth Shaw LLP on

The California Privacy Protection Agency (“CPPA”) has made it abundantly clear: privacy compliance isn’t just about publishing the right disclosures – it’s about whether your systems actually work. On May 6, the agency fined...more

Blake, Cassels & Graydon LLP

Digital Identity Verification Best Practices for Canadian Financial Services

Many financial services businesses are subject to legal or regulatory obligations that require them to verify the identity of their customers. Although innovative technological tools, including those using artificial...more

Mitratech Holdings, Inc

How to Automate Vendor Risk Management

Learn how automating third-party risk management (TPRM) can enhance efficiency, security, and compliance and help businesses proactively address vendor risks....more

Polsinelli

AI for GCs: What You Need to Know in 2025

Polsinelli on

During the course of 2024, interest in generative and other types of artificial intelligence, machine learning and predictive applications and services (collectively, AI) accelerated across industries. Some sectors, such as...more

Harris Beach Murtha PLLC

Have a SaaS Contract in Place? You May Need an AI Addendum

Virtually every business has signed an agreement with a software as a service (“SaaS”) provider at one time or another. And now, virtually every SaaS provider (it seems, at least) is coming out with an AI-related feature or...more

Conn Kavanaugh

Three Things You Should Know About Service Level Agreements in SaaS/Cloud Contracts

Conn Kavanaugh on

When a customer purchases software-as-a-service (SaaS)–which is sometimes called a “cloud” service or product–the software is not hosted. It does not reside at the customer’s location or data center. Rather the software is...more

Jackson Lewis P.C.

FAQs for Schools and Persons Affected By the PowerSchool Data Breach

Jackson Lewis P.C. on

A massive data breach hit one of the country’s largest education software providers. According to EducationWeek, PowerSchool provides school software products to more than 16,000 customers, largely K-12 schools, that serve 50...more

Fisher Phillips

The Essential Questions to Ask Your AI Vendor Before Deploying Artificial Intelligence at Your Organization

Fisher Phillips on

Recent studies reflect that more than 75% of companies are either using or exploring the use of AI in their businesses, and more than 80% of employers consider AI a top priority in their future business plans. But finding the...more

Fisher Phillips

The 5 Things Every Business Needs to Know About the Modern Consumer Privacy Landscape

Fisher Phillips on

It’s no longer good enough for your business to have a reactive approach to consumer privacy – you need a proactive strategy to manage compliance, foster consumer trust, and stay competitive in this modern era. While many...more

Husch Blackwell LLP

U.S. Privacy Litigation Update: September 2024

Husch Blackwell LLP on

Keypoint: California state courts weigh in on what does, and does not, qualify as a “pen registry” or “tap and trace” device while one California federal court raises whether a wiretapping claim can also allow for a CCPA...more

Harris Beach Murtha PLLC

Key Considerations for Selling AI Software to the Government

Harris Beach Murtha PLLC on

The federal government is the biggest purchaser in America and that extends to the SaaS space. On September 24, 2024, the Office of Management and Budget (OMB) released Memorandum M-24-18, offering updated guidelines for the...more

Husch Blackwell LLP

Key Considerations in AI-Related Contracts

Husch Blackwell LLP on

Keypoint: Companies onboarding AI products and services need to understand the potential risks associated with these products and implement contractual provisions to manage them. With the rapid emergence of artificial...more

Troutman Pepper Locke

Can Vendors Notify Affected Individuals on Behalf of Businesses After a Data Breach? - Dear Mary – Incidents + Investigations...

Troutman Pepper Locke on

‘Dear Mary,’ is Troutman Pepper’s Incidents + Investigations team’s advice column. Here, you will find Mary’s answers to questions about anything and everything cyber-related – data breaches, forensic investigations, how to...more

BakerHostetler

Deeper Dive into the Data - May 2024

BakerHostetler on

Every spring, BakerHostetler collects, analyzes, and compares key metrics on the incident response matters we handled in the prior year. The output – our Data Security Incident Response (DSIR) Report – highlights key findings...more

Osano

Vendor Assessments: The What, Why, and How

Osano on

Research shows that the average business shares its data with over 730 different vendors. It’s hard enough to mitigate risk within your own organization—how do you mitigate risk from more than 730 external entities?...more

Ankura

Operational Implications of the New Bulk Sensitive Data Executive Order

Ankura on

On February 28, 2024, President Biden signed Executive Order 14117 (the EO), on “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern.” The United...more

BakerHostetler

Reimagining Data in the Wave of AI

BakerHostetler on

Partner Janine Anthony Bowen explores data-related issues in technology contracts in the age of GenAI....more

Foley & Lardner LLP

Combatting Supply Chain Cyber Threats: Safeguarding Data and Protecting Digital Supply Chains

Foley & Lardner LLP on

As supply chains have become more digitized and interconnected, they have also become more vulnerable to a range of cyber threats. These threats not only pose risks to the direct operations of companies but also to the...more

Constangy, Brooks, Smith & Prophete, LLP

Take these steps to safeguard against third-party cyber threats

The ever-increasing privacy and security risks via third-party vendors and service providers were apparent in 2023 with news of large organizations such as MOVEit, Okta and AT&T being affected. Research has shown that 98...more

Jackson Lewis P.C.

Downstream Breaches Cause Headaches for Healthcare Providers, as State AG Seeks Law Change to Require AG Notification

Jackson Lewis P.C. on

For healthcare providers and health systems covered by the privacy and security regulations under the Health Insurance Portability and Accountability Act (HIPAA), a breach of unsecured protected health information (PHI)...more

Society of Corporate Compliance and Ethics...

[Webinar] Assessing the Privacy Risk Assessment - January 9th, 12:00 pm - 1:30 pm CT

Learning Objectives - Data privacy compliance requires the use of privacy impact assessments and data transfer assessments - What about the value of other assessments like privacy by design, online safety, AI risk,...more

Health Care Compliance Association (HCCA)

[Event] 2024 Managed Care Compliance Conference - January 29th - 30th, Coronado, CA

Explore the unique issues that are pertinent to managed care professionals! This annual event dedicated to compliance management for health plan providers is returning to an in-person format for 2024. Join your peers and...more

Carlton Fields

Colorado DOI Fast-Tracks Big Data Governance Rulemaking

Carlton Fields on

On August 31, 2023, the Colorado Division of Insurance will hold a virtual rulemaking hearing for its proposed regulation on governance and risk management framework requirements for life insurers using external consumer data...more

Bradley Arant Boult Cummings LLP

DoDIG Audit of Controlled Unclassified Information (CUI) Program: Findings and Next Steps for Contractors

The Department of Defense Inspector General (DoDIG) recently released its “Audit of the DoD’s Implementation and Oversight of the Controlled Unclassified Information [CUI] Program” (DODIG-2023-078). The audit highlights some...more

Polsinelli

Mitigating Your Greatest Data Privacy Risk

Polsinelli on

Third-party vendors pose a significant risk - The greatest data privacy threat to companies is commonly thought to be that company’s employees. While employees can be a threat, the majority of data breaches and ...more

133 Results
 / 
View per page
Page: of 6

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide