Podcast: Interoperability: Health Care's Next Disruptor Is openEHR - Diagnosing Health Care
Strategy Considerations for Global Litigation
In-house Roundhouse: Antitrust and the Tech Industry
M365 in 5 – Part 3: OneDrive for Business – Protected personal collaboration
M365 in 5 – Part 1: Exchange Online – Not just a mailbox
Data Privacy and Security 101: Six Questions to Ask Yourself
Episode #9 - Blockchain Basics with Trokt's Chris Draper
Compliance Perspectives: The Ethics of Data
Episode #7 - It's All About Latency: The Future of Data Processing and Storage
Compliance Perspectives: Regulatory Conflicts in Data Privacy Laws
Podcast: Private Fund Regulatory Update – Network and Cloud Storage
E14: The Three Pillars of GDPR
Straight Talks: Data privacy and cybersecurity in the age of rolling smart devices
A recent cyber attack targeting ZircoDATA, a data firm contracted by Australia’s Department of Home Affairs, has raised significant concerns about data privacy and cybersecurity in government-linked organizations. This breach...more
We’ve previously written on the need for law firms to scrutinize the data security protections in place at all third-party vendors who have access to client confidential information. Clearly, that’s still good advice....more
Powerful ideas emerge when you look at something through a completely different lens. And when two parties come together to share those unique perspectives? That’s when the magic happens. Womble Bond Dickinson’s virtual...more
This briefing is part of a Walkers series on the Data Protection (Bailiwick of Guernsey) Law, 2017 ("the DPL") was drafted to reflect the EU's General Data Protection Regulation (the "GDPR"). The DPL came into effect on 25...more
Remarkable progress in DNA and RNA sequencing have democratized the generation and analysis of genomic data across diverse industry sectors, including biopharmaceutical research, healthcare, consumer ancestry, law...more
On April 25, 2023, the Federal Communications Commission (FCC or Commission) released an Order and Notice of Proposed Rulemaking on international Section 214 authorizations (the Order and NPRM), which authorize the provision...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
To help protect against criminal ransomware and cyberattacks, modern manufacturing plants should ensure they have reasonable physical, administrative, and technical safeguards in place....more
Data is like the mail: it just keeps coming in, day after day. Storing and maintaining it is a never-ending process. Excess data can slow down operations, diminishing a law firm’s productivity, profitability, and public...more
The average cost of a data breach is on the rise. According to the 2022 ForgeRock Consumer Identity Breach Report, the average cost in 2021 of recovering from a data breach in the U.S. is $9.5 million — an increase of 16%...more
Today’s Privacy Reality: AI, Assessments, Breach and DSARs is a webcast that will bring together a panel of experts to discuss the impact of artificial intelligence (AI) on privacy and cybersecurity. The panel will address...more
The UK Department for Digital, Culture, Media & Sport (DCMS) recently extended the deadline for responses to a policy paper issued on May 26, 2022, calling for views on UK data storage and processing infrastructure, security,...more
1. Introduction- China’s cross-border data transfer rules are unfolding in real time and taking clearer shape. On July 7, 2022, China’s cybersecurity regulatory agency, the Cyberspace Administration of China (“CAC”), issued...more
The automotive industry has been a tight-knit and exclusive club since the 1950s automobile boom. After months of distress caused by semiconductor chip shortages, assembly plant shutdowns, and higher prices, is that still the...more
Efforts to secure systems and data from a cyberattack often focus on measures such as multifactor authentication (MFA), endpoint monitoring solutions, antivirus protections, and role-based access management controls, and for...more
Biometrics are physical or behavioral human characteristics that can be used to digitally identify a person to grant access to systems, devices, or data. Examples of biometric identifiers are fingerprints, facial geometry...more
Thomas Friedman's 2005 book titled The World is Flat discussed how globalization and technology flatten barriers to entry, making the world more competitive. From 2005 to 2021, there is no shortage of examples to highlight...more
Only two months after the release of the second draft of the Data Security Law of the People’s Republic of China (the Second Draft), on June 10, 2021, the Standing Committee of the National People's Congress passed the new...more
On 10 June 2021, the Standing Committee of the National People’s Congress of China (NPCSC) approved the enactment of Data Security Law (the DSL) of the People’s Republic of China (PRC), which will take effect on 1 September...more
Last week, a federal court in Illinois ruled that the Illinois Biometric Information Privacy Act (BIPA) (740 ILCS § 14/1 et seq.) can apply to companies that do not exclusively control consumers’ biometric data, denying an...more
As the COVID-19 pandemic and social distancing enforced remote work only accelerated the move to the cloud for many organizations, it should come as no surprise that the use of cloud-based solutions continues to be on the...more
In light of the development of technology and the widespread use of internet to transmit data, personal data protection has become a hot topic nowadays as people became more aware of their right to privacy. This article aims...more
Stephanie Lambert, Chief Compliance Counsel with NetScout Systems, Inc., and Womble Bond Dickinson partner and veteran cyber attorney Ted Claypoole talk with host and business litigator, Mark Henriques, about the current...more
On November 3, 2020 California voters approved the California Privacy Rights Act (CPRA) by a healthy margin. As we discussed last year, the CPRA addresses several perceived loopholes in the California Consumer Privacy Act...more
From investigating cybersecurity breaches to conducting discovery in civil litigation, the practice of digital forensics plays an essential role in many aspects of companies’ compliance, data protection, and risk management...more