News & Analysis as of

Data Security Best Practices Personal Data

A&O Shearman

Hong Kong Privacy Commissioner releases First AI-focused Personal Data Protection Framework in APAC

A&O Shearman on

As Artificial Intelligence (AI) continues to evolve and integrates into business processes, the Office of the Privacy Commissioner for Personal Data (PCPD) released its Artificial Intelligence: Model Personal Data Protection...more

Esquire Deposition Solutions, LLC

Actionable Advice When Sharing Client Data with Vendors

We’ve previously written on the need for law firms to scrutinize the data security protections in place at all third-party vendors who have access to client confidential information. Clearly, that’s still good advice....more

Levenfeld Pearlstein, LLC

Texas, Florida, and Delaware, Oh My!: An Update On 2024 & 2025 State Data Privacy Laws

The U.S. cybersecurity and data privacy law framework continues to evolve and expand rapidly. Here, we share a summary of the eight new state data privacy and security laws that will take effect in 2024 and 2025. Businesses...more

Tarter Krinsky & Drogin LLP

Law Brief®: Rich Schoenstein and Annmarie Giblin Discuss Cyber Law

On the latest episode of Law Brief, Cybersecurity, Data Management & Privacy Co-Chair, Annmarie Giblin joins Rich to discuss cybersecurity law. They talk about the best practices for businesses interacting with customers’...more

Wyrick Robbins Yates & Ponton LLP

A Prelude to Enforcement: Colorado AG Issues Remarks Opining on What Constitutes Reasonable Security Measures

Last month, on Data Privacy Day, Colorado’s Attorney General Philip Weiser released prepared remarks entitled “The Way Forward on Data Privacy and Data Security” that shed some light on his approach to enforcing Colorado’s...more

Lathrop GPM

2022 Legal Guide to Privacy and Data Security

Lathrop GPM on

Facial recognition technology, drones the size of a butterfly, secure microchips replacing magnetic stripes on credit cards, sensors the size of a grain of sand swallowed by patients that transmit data directly to the...more

Blank Rome LLP

Privacy, Data Security & Workplace Wearables: Best Practices for Employers

Blank Rome LLP on

Today, tracking your heart rate and glucose levels no longer requires a visit to the doctor's office; instead, all that is needed is a smartwatch. The rise of wearable fitness devices and applica­tions equipped with health...more

Association of Certified E-Discovery...

[Webinar] The Intersection of eDiscovery and Data Security Incidents - November 30th, 1:00 pm - 2:00 pm EST

The Coronavirus pandemic is moving more organizations to remote working models. This enhances the potential trajectory for data security incidents and other information exfiltration to increase dramatically. The number of...more

McDermott Will & Emery

[Event] CCPA Compliance: An Interactive Workshop - Multiple Dates/Locations, February 11th - 24th

McDermott Will & Emery on

Effective as of January 1, 2020, the California Consumer Privacy Act (CCPA) gives broad rights to people on their personal data in the custody of companies. This focus on data rights significantly raises the compliance burden...more

McDermott Will & Emery

[Event] CCPA Compliance: An Interactive Workshop - Multiple Dates/Locations, Jan. 22nd - 30th

McDermott Will & Emery on

Effective as of January 1, 2020, the California Consumer Privacy Act (CCPA) gives broad rights to people on their personal data in the custody of companies. This focus on data rights significantly raises the compliance burden...more

Shook, Hardy & Bacon L.L.P.

Privacy and Data Security Alert | December 2019

SDNY Rejects Standing under “Increased Risk” Theory Where Data Not Targeted or Stolen - The Southern District of New York rejected a settlement that would have resolved a class action based on the unauthorized (and...more

McDermott Will & Emery

[Event] Countdown To CCPA: An Interactive Compliance Workshop - Multiple Dates/Locations, Nov. 20th - Dec. 5th

McDermott Will & Emery on

Effective January 1, 2020, the California Consumer Privacy Act (CCPA) will give broad rights to people on their personal data in the custody of companies. This focus on data rights significantly raises the compliance burden...more

Miles & Stockbridge P.C.

Employees Are a Gatekeeper to Effective Data Security

Data security and privacy concerns have become one of the top issues keeping business leaders up at night. According to the Ponemon Institute’s 2018 study regarding the cost of data breaches, data breaches are increasingly...more

Fenwick & West LLP

FTC Toughening Stance on Data Security – Five Key Takeaways from Recent Consent Orders

Fenwick & West LLP on

The Federal Trade Commission is putting more teeth into the multiyear compliance obligations of consent orders it enters into with companies to settle enforcement actions related to data breaches. The FTC recently issued a...more

Foley Hoag LLP - Security, Privacy and the...

Is it weird not to have a privacy policy? (And other thoughts on privacy policy best practices.)

You probably are employed by an organization that has a website privacy policy. I am. That’s because most organizations process personal information through their websites in some way, such as through online forms that ask...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

Data Breach in Brief: Knowing the Risks and Protecting Your Company

Data breaches continue to be an unfortunate risk that companies face with increasing frequency. In this podcast, Rebecca Bennett, Stephen Riga, and Justin Tarka discuss data breaches from both a U.S. and EU perspective,...more

Hogan Lovells

Best practices for managing cybersecurity risks related to IoT-connected medical devices

Hogan Lovells on

Connected medical devices deliver numerous benefits not available before, including improved monitoring of patient welfare and a wealth of vital data. But for all the advantages available through these devices, their...more

BCLP

How to Design a Document Retention Policy

BCLP on

Data minimization can be a powerful – and seemingly simple – data security measure. The term refers to retaining the least amount of personal information necessary in order for an organization to function. Less information...more

18 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide