News & Analysis as of

Data Security

Womble Bond Dickinson

AI Toolkit for Leaders: Use Cases, Benefits and Guardrails

Womble Bond Dickinson on

If 2023 was the year of, “What is AI?” and 2024 was the year of “Be afraid of AI,” then 2025 is the year of “If you aren’t using AI, you are already behind.” That was the message of Womble Bond Dickinson’s AI Toolkit for...more

Cooley LLP

Understanding and Complying With the DOJ’s Bulk Data Rule  

Cooley LLP on

This post is one in a series where we discuss the US Department of Justice’s (DOJ’s) bulk sensitive data rule (rule), which prohibits individuals or entities from certain foreign countries, including China, from accessing...more

Loeb & Loeb LLP

New FTC FAQs for Auto Dealers to Comply with the Safeguards Rule

Loeb & Loeb LLP on

The Federal Trade Commission (FTC) released new frequently asked questions (FAQs) aimed at helping auto dealerships comply with its financial data protection regulations, emphasizing that the duty to protect consumers'...more

Kilpatrick

Is Gen AI Really A Threat to Trade Secrets?

Kilpatrick on

The advent of generative artificial intelligence has given rise to a debate about how this innovative technology will affect intellectual property rights and trade secret protections in particular....more

Alston & Bird

Are You Ready for the Department of Justice’s Bulk Data Transfer Rule?

Alston & Bird on

On July 8, 2025, the Department of Justice (“DOJ”) is set to lift its self-imposed pause on enforcing certain violations of its Rule Preventing Access to US Sensitive Personal Data and Government-Related Data by Countries of...more

Jackson Lewis P.C.

Texas Enacts Liability Shield From Punitive Damages for Certain Small Businesses That Adopt Cybersecurity Programs

Jackson Lewis P.C. on

On June 20, 2025, Texas Governor Greg Abbott signed SB 2610 into law, joining a growing number of states that aim to incentivize sound cybersecurity practices through legislative safe harbors. Modeled on laws in states like...more

Robinson+Cole Data Privacy + Security Insider

Why Dumping Sensitive Data on Network Shares is a Liability

Are you storing sensitive data on a shared network drive? If so, your organization could be at serious risk of a data breach or privacy lawsuit. Shared drives, like the common “S:\ drive,” are often used to store documents,...more

Clark Hill PLC

Employers: A cautionary tale about new cyber threats involving employee handbooks

Clark Hill PLC on

Cybercriminals are obtaining copies of real or fake employee handbooks and distributing them by email, spoofing a legitimate employer email address so that the email and its attachment appear authentic. The email asks the...more

Accelerynt, Inc.

Automating Identity Threat Response: Automating IP Blocking, Session Revocation, and Blocklist Management

Accelerynt, Inc. on

Credential-based threats—such as password sprays, token reuse, and low-complexity sign-in attempts—remain a constant operational burden. While these activities are easily detected in most environments, the workflows to fully...more

Dacheng

China Monthly Data Protection Update: June 2025

Dacheng on

This monthly report outlines key developments in China’s data protection sector for June. TC260 Two Cybersecurity Practice Guidelines on Personal Information Protection Compliance Audits: On May 19, 2025, TC260 issued two...more

Woods Rogers

New Cybersecurity Executive Order Revises Specific Federal Policies While Retaining Core Security Principles

Woods Rogers on

On June 6, 2025, the Trump Administration issued a new Executive Order, Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144 (the EO) that contains...more

BakerHostetler

[Podcast] 2025 DSIR Deeper Dive: Deeper Dive into the Data

BakerHostetler on

We’re back with a deeper dive into the 2025 Data Security Incident Response Report, which features insights and metrics from more than 1,250 incidents in 2024. This episode dives deeper into the data, including network...more

Womble Bond Dickinson

Senator Cantwell Demands Proof from Verizon and AT&T on Salt Typhoon Eradication

Womble Bond Dickinson on

Senator Maria Cantwell (D-WA), Ranking Member of the Senate Commerce, Science, and Transportation Committee, has formally requested that Verizon Communications Inc. and AT&T Inc. provide concrete evidence that they have fully...more

Foley & Lardner LLP

HIPAA Risk Analyses for Digital Health: Navigating AI, M&A and Vendor Diligence

Foley & Lardner LLP on

Share on Twitter Share by Email Share Back to top HIPAA Security Risk Analyses (SRAs) should be the foundation of every digital health company’s cybersecurity compliance. Far more than a checkbox exercise, a comprehensive SRA...more

HaystackID

New AI, New Risks: Inside GenAI’s Cybersecurity Dilemma

HaystackID on

Generative artificial intelligence, once the subject of experimental labs and speculative fiction, is now a central force in digital transformation, and cybersecurity professionals are finding themselves on unfamiliar ground....more

Nelson Mullins Riley & Scarborough LLP

Enforcement Date for DOJ’s Sensitive Data Rule Approaches: Are Your Cross-Border Transfers Compliant?

On April 8, 2025, the Department of Justice’s Final Rule, titled “Provisions Pertaining to Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countries of Concern or Covered Persons,” (the “Final...more

Esquire Deposition Solutions, LLC

How AI Is Helping Corporate Legal Departments

According to a recent survey, artificial intelligence gained a significant foothold in corporate legal departments in 2025, where it is being used mostly for contract drafting and review, legal research, and document...more

Guidepost Solutions LLC

[Webinar] Data Under Watch: Navigating DOJ’s New Rules on Sensitive U.S. Data Transfers - June 26th, 1:00 pm ET

Starting July 9, 2025, the U.S. Department of Justice will begin enforcing its new “Bulk Sensitive Data Rule,” a sweeping regulation aimed at restricting the transfer and storage of sensitive U.S. personal and...more

Herbert Smith Freehills Kramer

Protecting your business: The implications of Australia’s new privacy tort

On 10 June 2025, the new statutory tort for serious invasions of privacy came into force as part of a suite of privacy reforms passed last year, substantially enhancing privacy protections and signalling a material shift in...more

Morgan Lewis

China Issues New National Standard on Security Requirements for Sensitive Personal Information

Morgan Lewis on

The State Administration for Market Regulation and the Standardization Administration of China have jointly issued a new national standard applicable to companies conducting business in China, GB/T 45574-2025, Data Security...more

K&L Gates LLP

Arbitration World: the Singapore International Arbitration Centre (SIAC) (Part 2)

K&L Gates LLP on

This publication is issued by K&L Gates Straits Law LLC, a Singapore law firm with full Singapore law and representation capacity, and to whom any Singapore law queries should be addressed. K&L Gates Straits Law is the...more

Sheppard Mullin Richter & Hampton LLP

North Dakota Passes New Data Security Law for “Financial Corporations”

North Dakota recently passed a law establishing new rules for certain financial companies operating in the state – specifically “financial corporations.” The new obligations will take effect on August 1, 2025. They will apply...more

Skadden, Arps, Slate, Meagher & Flom LLP

Deadline Fast Approaching for Data Security Program Compliance

The Department of Justice (DOJ) implemented a new regulatory regime (Data Security Program) addressing access to, and transfer of, sensitive personal data to countries and persons of concern, including Russia, China and...more

Morgan Lewis

Trade Secrets in the Automotive Industry

Morgan Lewis on

As recent innovations in automotive technology continue to fuel unprecedented growth across the industry, companies must adapt their privacy and confidentiality capabilities to safeguard highly valuable trade secrets. With...more

Ankura

The Journey to Data Truth: Building Financial Intelligence That Matters

Ankura on

In today's data-driven business landscape, "single source of truth" (“SSoT”) has become the defining standard for trusted, authoritative, consistent, and accurate financial intelligence. As leaders in financial advisory, we...more

8,751 Results
 / 
View per page
Page: of 351

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide