News & Analysis as of

Data Security Cybersecurity Employees

Wolf, Greenfield & Sacks, P.C.

Spring Cleaning and Tune-up for Your Trade Secret Portfolio: Eight Steps

Spring has arrived, and in addition to cleaning, it’s a good time to reassess how your company is handling its trade secrets. Far from being static, trade secret innovations, processes, and data evolve over time. Business...more

Purpose Legal

How to Prevent Data Exfiltration and Protect Your IP – Q&A with Steve Davis

Purpose Legal on

What exactly is data exfiltration, and why should organizations be concerned about it? Data exfiltration is the movement or migration of company-owned trade secrets or intellectual property outside of the enterprise. It...more

Littler

Considerations for Artificial Intelligence Policies in the Workplace

Littler on

In recent years, many organizations have implemented new policies on artificial intelligence (AI) use to help prevent bias, plagiarism, or use of AI tools that produce inaccurate or misleading information. Meanwhile, many...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #433 – Privacy and Security Personnel Throughout Federal Government Fired

The Trump administration has systematically fired federal privacy- and security-focused employees since taking office. Three members of the bipartisan, independent agency, the Privacy and Civil Liberties Oversight Board...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #426 – CyberArk Report Confirms Employees Bypass Cybersecurity Policies

CyberArk, an identity security provider, has issued a new report on employee risk that is a must-read for IT Professionals and executives. The report highlights several findings that are directly related to the risks...more

Quarles & Brady LLP

New York DFS Cybersecurity Regulation Outlines Actions with High ROI

Quarles & Brady LLP on

As of November 1, 2024, financial services companies regulated by the New York Department of Financial Services Cybersecurity Regulation face new requirements relating to cybersecurity governance, encryption, and incident...more

Spilman Thomas & Battle, PLLC

Remote Work Strategies for Managing Cybersecurity Teams

Managing a remote cybersecurity team at colleges and universities involves addressing a unique set of challenges to ensure the security of sensitive data and infrastructure. There is an additional overlay of potential...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 5, May 2023

Cyber Resilience Programs Falling Short on Preparing Workers for a Crisis- “At two-thirds of organizations, there is a fear that almost all employees, 95%, will not understand how to recover following a cyberattack.” ...more

Health Care Compliance Association (HCCA)

Report on Patient Privacy Volume 23, Number 2. Privacy Briefs: February 2023

Report on Patient Privacy Volume 23, no 2 (February 2023) DCH Health Systems, based in Tuscaloosa, Ala., said it fired an employee in December after a routine privacy audit revealed evidence that the worker had accessed some...more

UB Greensfelder LLP

Colorado Passes New Comprehensive Consumer Data Protection Act

UB Greensfelder LLP on

Earlier this month, the governor of Colorado signed into law the Colorado Privacy Act (CPA), making Colorado the third state to enact a comprehensive data security law after California in 2018 and Virginia in March 2021. The...more

Faegre Drinker Biddle & Reath LLP

IT Security Trends in the Era of COVID: Our Top Five Tips for Making Your Network Safer in 2021

As the COVID era drags on, it is clear that work life “post-COVID” may be very different from life “pre-COVID.” This is especially true as it relates to IT security. More and more employees have shifted to a telecommuting...more

McDermott Will & Emery

International News: Focus on Global Privacy and Cybersecurity - September 2020

McDermott Will & Emery on

Generally, contact tracing refers to an effort by public health officials to identify individuals with whom a patient who has tested positive for an infectious disease has been in close proximity. Public health officials will...more

Fisher Phillips

Does Being Fit Increase Your Company’s Risk of Security Breaches?

Fisher Phillips on

As we are early into the new year, for many, hope springs eternal to get in shape during 2018. Many of us wear some kind of fitness activity tracker that monitors steps, heart rate, calories, sleep patterns, etc. Recent news...more

Baker Donelson

Living in the Clouds: Is Your Business Data at Risk Because of a Disgruntled Employee?

Baker Donelson on

TheCloud: Good Morning! TheCloud is a leading cloud-based provider, striving to secure your apps, email and confidential data in the cloud. How may we help you today? Mr. Techie: My name is Mr. TechieTechie, I’m the CEO...more

Best Best & Krieger LLP

Best in Law: Data Security and the Inside Job

If you are a business owner in the Inland Empire, what would you identify as the greatest threat to the security of your data? Is it hackers looking for credit-card numbers? Could it be foreign governments stealing industrial...more

King & Spalding

Coordinated Hackers Infiltrate 200 Targeted Employees’ LinkedIn Networks

King & Spalding on

Cybersecurity researchers at the Dell SecureWorks Counter Threat Unit (“Dell CTU”) uncovered a network of approximately 25 fake LinkedIn profiles that Dell CTU believes were used by an Iran-linked hacker group to establish at...more

Foley & Lardner LLP

Florida’s CADRA a Powerful New Data Protection

Foley & Lardner LLP on

Florida businesses will soon have an important and powerful new legal cause of action to combat unauthorized access to protected computer systems or data by employees, former employees, directors, officers, and others....more

17 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide