News & Analysis as of

Data Storage Cybersecurity

HaystackID

Cybersecurity Breach Targets Australian Data Firm ZircoDATA, Exposing Sensitive Personal Information

HaystackID on

A recent cyber attack targeting ZircoDATA, a data firm contracted by Australia’s Department of Home Affairs, has raised significant concerns about data privacy and cybersecurity in government-linked organizations. This breach...more

Esquire Deposition Solutions, LLC

Actionable Advice When Sharing Client Data with Vendors

We’ve previously written on the need for law firms to scrutinize the data security protections in place at all third-party vendors who have access to client confidential information. Clearly, that’s still good advice....more

Womble Bond Dickinson

[Webinar] Innovation Interchange Summit: The Power Of Cross-Industry Insight - May 16th, 11:00 am - 4:00 pm ET

Womble Bond Dickinson on

Powerful ideas emerge when you look at something through a completely different lens. And when two parties come together to share those unique perspectives? That’s when the magic happens. Womble Bond Dickinson’s virtual...more

Walkers

Guernsey data protection series - the seven data protection principles

Walkers on

This briefing is part of a Walkers series on the Data Protection (Bailiwick of Guernsey) Law, 2017 ("the DPL") was drafted to reflect the EU's General Data Protection Regulation (the "GDPR"). The DPL came into effect on 25...more

McDermott Will & Emery

Special Report - Decoding Genomic Data Security: Lessons from FTC’s Vitagene Enforcement and the NIST CSF Profile for Genomic Data

McDermott Will & Emery on

Remarkable progress in DNA and RNA sequencing have democratized the generation and analysis of genomic data across diverse industry sectors, including biopharmaceutical research, healthcare, consumer ancestry, law...more

Wiley Rein LLP

The FCC Releases International Section 214 Order and NPRM, Proposing Major Changes to the Regulation of International...

Wiley Rein LLP on

On April 25, 2023, the Federal Communications Commission (FCC or Commission) released an Order and Notice of Proposed Rulemaking on international Section 214 authorizations (the Order and NPRM), which authorize the provision...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

Jackson Lewis P.C.

How Modern Manufacturing Plants Can Protect Against Ransomware, Cyberattacks

Jackson Lewis P.C. on

To help protect against criminal ransomware and cyberattacks, modern manufacturing plants should ensure they have reasonable physical, administrative, and technical safeguards in place....more

Reveal

A Guide to Efficient Data Remediation for Law Firms in 2023

Reveal on

Data is like the mail: it just keeps coming in, day after day. Storing and maintaining it is a never-ending process. Excess data can slow down operations, diminishing a law firm’s productivity, profitability, and public...more

Rothwell, Figg, Ernst & Manbeck, P.C.

Learning From Data Breach Cases To Reduce Legal Risk

The average cost of a data breach is on the rise. According to the 2022 ForgeRock Consumer Identity Breach Report, the average cost in 2021 of recovering from a data breach in the U.S. is $9.5 million — an increase of 16%...more

HaystackID

[Webinar] Today’s Privacy Reality: AI, Assessments, Breach and DSARs - February 15th, 12:00 pm - 1:00 pm EST

HaystackID on

Today’s Privacy Reality: AI, Assessments, Breach and DSARs is a webcast that will bring together a panel of experts to discuss the impact of artificial intelligence (AI) on privacy and cybersecurity. The panel will address...more

Morgan Lewis - Tech & Sourcing

UK Government Still Seeks Input on Data Storage and Processing Infrastructure, Security, and Resilience

The UK Department for Digital, Culture, Media & Sport (DCMS) recently extended the deadline for responses to a policy paper issued on May 26, 2022, calling for views on UK data storage and processing infrastructure, security,...more

Paul Hastings LLP

China Enhances Scrutiny for Cross-Border Data Transfer that would Impact Multinational Companies

Paul Hastings LLP on

1. Introduction- China’s cross-border data transfer rules are unfolding in real time and taking clearer shape. On July 7, 2022, China’s cybersecurity regulatory agency, the Cyberspace Administration of China (“CAC”), issued...more

TransPerfect Legal

Changing the Automotive Narrative: Hacking Concerns & Wireless Communication Interfaces

TransPerfect Legal on

The automotive industry has been a tight-knit and exclusive club since the 1950s automobile boom. After months of distress caused by semiconductor chip shortages, assembly plant shutdowns, and higher prices, is that still the...more

Jackson Lewis P.C.

The RIPTA Data Breach May Provide Valuable Lessons About Data Collection and Retention

Jackson Lewis P.C. on

Efforts to secure systems and data from a cyberattack often focus on measures such as multifactor authentication (MFA), endpoint monitoring solutions, antivirus protections, and role-based access management controls, and for...more

Morgan Lewis - Health Law Scan

Beware of Biometrics: Complying with Illinois’ Biometric Information Privacy Act

Biometrics are physical or behavioral human characteristics that can be used to digitally identify a person to grant access to systems, devices, or data. Examples of biometric identifiers are fingerprints, facial geometry...more

Womble Bond Dickinson

Computing on the Edge

Womble Bond Dickinson on

Thomas Friedman's 2005 book titled The World is Flat discussed how globalization and technology flatten barriers to entry, making the world more competitive. From 2005 to 2021, there is no shortage of examples to highlight...more

Perkins Coie

China’s New Data Security Law Comes Into Force

Perkins Coie on

Only two months after the release of the second draft of the Data Security Law of the People’s Republic of China (the Second Draft), on June 10, 2021, the Standing Committee of the National People's Congress passed the new...more

K&L Gates LLP

China's New Data Security Law Bolsters Its Data Security Legal Regime

K&L Gates LLP on

On 10 June 2021, the Standing Committee of the National People’s Congress of China (NPCSC) approved the enactment of Data Security Law (the DSL) of the People’s Republic of China (PRC), which will take effect on 1 September...more

UB Greensfelder LLP

Illinois Federal Court Rules Apple May Be “In Possession” of Biometric Data Stored on User Devices

UB Greensfelder LLP on

Last week, a federal court in Illinois ruled that the Illinois Biometric Information Privacy Act (BIPA) (740 ILCS § 14/1 et seq.) can apply to companies that do not exclusively control consumers’ biometric data, denying an...more

Reveal

Ramping Up Cloud Usage for Government Agencies

Reveal on

As the COVID-19 pandemic and social distancing enforced remote work only accelerated the move to the cloud for many organizations, it should come as no surprise that the use of cloud-based solutions continues to be on the...more

BCLP

PRC Legal Update: Introduction to the legal requirements on personal data protection in China

BCLP on

In light of the development of technology and the widespread use of internet to transmit data, personal data protection has become a hot topic nowadays as people became more aware of their right to privacy. This article aims...more

Womble Bond Dickinson

In-house Roundhouse: Antitrust and the Tech Industry

Womble Bond Dickinson on

Stephanie Lambert, Chief Compliance Counsel with NetScout Systems, Inc., and Womble Bond Dickinson partner and veteran cyber attorney Ted Claypoole talk with host and business litigator, Mark Henriques, about the current...more

Wyrick Robbins Yates & Ponton LLP

The CPRA’s Storage Limitation Requirement is Coming—Practical Tips for Shoring Up Your Record Retention Practices to Comply

On November 3, 2020 California voters approved the California Privacy Rights Act (CPRA) by a healthy margin.  As we discussed last year, the CPRA addresses several perceived loopholes in the California Consumer Privacy Act...more

Oberheiden P.C.

5 Keys to Picking the Best Digital Forensics Company

Oberheiden P.C. on

From investigating cybersecurity breaches to conducting discovery in civil litigation, the practice of digital forensics plays an essential role in many aspects of companies’ compliance, data protection, and risk management...more

45 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide