News & Analysis as of

Data Security

Morris, Manning & Martin, LLP

Legal Issues Around AI Are Real. And Complex.

Last week I had the pleasure of sitting down and discussing the legal implications of AI with a group of General Counsels. This group of GCs represented companies from the Fortune 100 all the way to mid-size enterprises. That...more

Baker Donelson

Lessons From the Suffolk County Ransomware Attack That Apply to All Businesses

Baker Donelson on

In December 2021, Suffolk County, New York, experienced a significant cybersecurity breach that culminated in a ransomware attack in September 2022. The attack went undetected for months, allowing the attackers to install...more

Arnall Golden Gregory LLP

Healthcare Authority Newsletter - October 2024 #3

News Briefs - FTC Finalizes Providers' Reporting Rules Prior to M&A - The Federal Trade Commission finalized changes to a rule that will require healthcare companies, including hospitals and providers, to provide more...more

Alston & Bird

FTC and State AGs Settle with Marriott over Starwood Data Breaches

Alston & Bird on

Our Consumer Protection/FTC and Privacy, Cyber & Data Strategy teams unpack Starwood Hotels’ and Marriott International’s settlements with the Federal Trade Commission and Marriott’s settlement with state attorneys general...more

Alston & Bird

Singapore Cybersecurity Agency Publishes Guidelines on Securing AI Systems

Alston & Bird on

On October 15, 2024, the Cyber Security Agency of Singapore (“CSA”) published Guidelines on Securing AI Systems (the “Guidelines”) alongside a Companion Guide for Securing AI Systems (the “Companion Guide”), which is intended...more

Blake, Cassels & Graydon LLP

Un nouveau droit à la portabilité des données est en vigueur au Québec

Le 22 septembre 2024, un nouveau droit individuel à la portabilité des données est entré en vigueur en vertu de la législation québécoise sur la protection de la vie privée applicable dans le secteur privé, soit la Loi sur la...more

Troutman Pepper

Cyber Incident Response Checklist for SEC Compliance

Troutman Pepper on

By now, public companies are generally aware of the cybersecurity rules adopted by the U.S. Securities and Exchange Commission a year ago, requiring public companies to disclose material cybersecurity incidents under Item...more

K2 Integrity

Cybersecurity Awareness Month: Doubling Your Account Security With Multi-Factor Authentication - Update

K2 Integrity on

Cybersecurity Awareness Month was established more than 20 years ago to provide resources to enable organizations and their employees to stay safer and more secure online...more

Nelson Mullins Riley & Scarborough LLP

Department of Defense Issues New Government Contractor Cybersecurity Rules

The United States Department of Defense (DoD) finalized a new rule implementing the Cybersecurity Maturity Model Certification (CMMC) program. The program includes a minimum cybersecurity requirement for almost all DoD...more

DLA Piper

EU: NIS2 Member State Implementation Deadline Has Arrived

DLA Piper on

The Network and Information Systems Directive II (“NIS2“), requires that Member States transpose measures into national law by today (17 October 2024). NIS2 is part of the EU’s Cybersecurity Strategy and repeals and replaces...more

Alston & Bird

Green Light for the Enforcement of NIS 2 in Limited EU Countries Only

Alston & Bird on

EU Member States had until today, October 17, 2024, to transpose the Network and Information Security (NIS) 2 Directive into their national laws. As Directives are not directly applicable in EU Member States, the EU...more

Dinsmore & Shohl LLP

[Webinar] Don't Be the Next Change Healthcare: How to Avoid a Breach and Prepare Your Response Plan - October 29th, 12:00 pm -...

Dinsmore & Shohl LLP on

During the first half of this webinar, Jen Mitchell, Bryan Murray and Laura Fryan, will focus on practical tips and pointers on avoiding a HIPAA breach and what lessons you can take away from the Change Healthcare breach. ...more

DLA Piper

CHINA: Enhanced and Clarified Data Compliance Obligations on Handlers of “Network Data”, Covering Personal Information and...

DLA Piper on

Additional and clarified data compliance obligations will soon come into force under the long-awaited Network Data Security Management Regulation (“Regulation“), which was released on 30 September 2024. The Regulation is...more

Cooley LLP

Cybersecurity in the US

Cooley LLP on

As our world becomes increasingly digital, the importance of cybersecurity has never been more critical. In the first blog post in our series for Cybersecurity Awareness Month, we explored the cybersecurity regulatory...more

Ward and Smith, P.A.

Three Cybersecurity Mistakes Small Businesses Make: A Data Privacy Attorney's Perspective

Ward and Smith, P.A. on

In today's digital landscape, where data and technology are integral to business, companies of all sizes are prime targets for cyberattacks. As privacy and data security attorneys, we see the severe impact of inadequate...more

Awatif Mohammad Shoqi Advocates & Legal...

Digital Transactions: Consumer Rights, E-Security, and Data Privacy Under Modern Technology Regulation

The rise of digital transactions has transformed interactions between consumers and businesses. As technology rapidly advances, regulatory frameworks must adapt to address emerging challenges. Federal Decree-Law No. 14/2023...more

Keating Muething & Klekamp PLL

Intellectual Property Law in the Age of Generative AI

The recent surge of accessible generative AI (“GenAI”) tools has kept attorneys, particularly those in the intellectual property, technology, data privacy, and cybersecurity spaces, on their toes. Within the intellectual...more

Gray Reed

Three Data Privacy Lessons Learned from the Marriott Data Breach

Gray Reed on

Enforcement of data privacy laws across the US is in full force. Most recently, Marriott agreed to a $52 million settlement payment to 50 states, including $3.5 million to the State of Texas, following a data breach of 131...more

Health Care Compliance Association (HCCA)

2nd Settlement Triggered by 2017 Ransomware Attack Costs WA Practice $100K; ‘Not a Breach’

Let’s review for a moment. It’s not a HIPAA violation to be a victim of ransomware. It’s not a HIPAA violation to pay a ransom. It’s up to the covered entity (CE) to determine if a security or privacy incident is a...more

Morris, Manning & Martin, LLP

Navigating AI Risks: A Guide for Board Members

As artificial intelligence (AI) continues its rapid evolution, its impact on the corporate landscape is becoming increasingly profound. For boards of directors, the rise of AI presents a unique blend of opportunities and...more

BakerHostetler

[Podcast] Technology from the Top: AI, Data and the Future of Business with Today’s CIOs – Sharay Erskine

BakerHostetler on

Partner Janine Anthony Bowen sits down one-on-one with current Chief Information Officers in the new series, “Technology from the Top: AI, Data and the Future of Business with Today’s CIOs” to discuss how they are adjusting...more

Gray Reed

Constructing Compliance: What the Construction Industry Needs to Know about the Texas Data Privacy and Security Act

Gray Reed on

The Texas Data Privacy and Security Act (TDPSA) is now in full effect, and this comprehensive legislation establishes stringent mandates on how consumer-related personal data of Texas residents should be collected, used,...more

Baker Donelson

Data Breaches: The Not-So-Hidden Cost of Doing Business

Baker Donelson on

In this era of big data, smart devices, and constant connectivity, the clock's already ticking on your next data breach – it's just a matter of time. For companies of all sizes and across every industry, the stakes have never...more

Osano

4 Ways Privacy in Business Generates ROI

Osano on

Modern businesses have to be compliant with data privacy regulations. Everyone knows that. But nobody likes being told they have to do something. Especially not when that something seems like an expensive, complicated...more

Mayer Brown

2024 Cyber Litigation Legal Update – What Your Business Needs To Know

Mayer Brown on

By now, companies across all industries have become familiar with the lifecycle and stages of a ransomware incident. Generally, once an attack is contained, remediation and rebuilding will follow. Shortly after, the crisis...more

7,932 Results
 / 
View per page
Page: of 318

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide