News & Analysis as of

Data Storage Data Protection

Health Care Compliance Association (HCCA)

AI is here to stay?

Artificial intelligence or AI—yes, we are talking about it again. The explosion of AI in healthcare will only continue to grow. Statistics show that the total market value of AI in healthcare will expand to over $148 billion...more

A&O Shearman

Australian Government Introduces Major Amendments to the Security of Critical Infrastructure Act 2018

A&O Shearman on

Aiming to bolster the security and resilience of critical infrastructures in Australia, the Australian Government introduced the Security of Critical Infrastructure and Other Legislation Amendment (Enhanced Response and...more

Esquire Deposition Solutions, LLC

Actionable Advice When Sharing Client Data with Vendors

We’ve previously written on the need for law firms to scrutinize the data security protections in place at all third-party vendors who have access to client confidential information. Clearly, that’s still good advice....more

International Lawyers Network

Data Privacy Guide - Romania

Governing Data Protection Legislation - 2.1. Overview of principal legislation - The General Regulation Data Protection (Regulation (EU) 2016/679) (“GDPR”), as implemented by Law 190/2018 is the principal data...more

International Lawyers Network

Data Privacy Guide - Czech Republic

Introduction - The General Data Protection Regulation (Regulation (EU) 2016/679) is the EU regulation which is directly applicable in all member states of the EU, including the Czech Republic, as of 25 May 2018. The new...more

Womble Bond Dickinson

[Webinar] Innovation Interchange Summit: The Power Of Cross-Industry Insight - May 16th, 11:00 am - 4:00 pm ET

Womble Bond Dickinson on

Powerful ideas emerge when you look at something through a completely different lens. And when two parties come together to share those unique perspectives? That’s when the magic happens. Womble Bond Dickinson’s virtual...more

Pierce Atwood LLP

New Hampshire Enacts Consumer Data Privacy Act

Pierce Atwood LLP on

It’s official – New Hampshire has joined the procession of states across the nation (from California to Connecticut and many states in between) enacting broadly applicable consumer privacy laws....more

Walkers

Guernsey data protection series - the seven data protection principles

Walkers on

This briefing is part of a Walkers series on the Data Protection (Bailiwick of Guernsey) Law, 2017 ("the DPL") was drafted to reflect the EU's General Data Protection Regulation (the "GDPR"). The DPL came into effect on 25...more

Skadden, Arps, Slate, Meagher & Flom LLP

AI Insights: Public Consultation Period Closes for French CNIL Guidance on GDPR-Compliant Development of AI Systems

On 16 October 2023, France’s Data Protection Authority, the National Commission on Informatics and Liberty (CNIL), issued a set of guidelines for complying with the EU General Data Protection Regulation (GDPR) when...more

Proskauer - Minding Your Business

Big Tech, Biometrics and BIPA: Meta’s Recent $68.5M Class Action Settlement

In July, Instagram’s parent company Meta Platforms, Inc. (“Meta”) agreed to a $68.5 million class-action biometric privacy settlement in connection with the company’s alleged violation of Illinois’ Biometric Information...more

Dechert LLP

UK Data Regulator Joins Scrutiny of WorldCoin

Dechert LLP on

WorldCoin is a cryptocurrency project which uses iris scanning technology to issue a “World ID” as a digital identifier. Privacy concerns over WorldCoin have been voiced by several data protection authorities worldwide....more

McDermott Will & Emery

Special Report - Decoding Genomic Data Security: Lessons from FTC’s Vitagene Enforcement and the NIST CSF Profile for Genomic Data

McDermott Will & Emery on

Remarkable progress in DNA and RNA sequencing have democratized the generation and analysis of genomic data across diverse industry sectors, including biopharmaceutical research, healthcare, consumer ancestry, law...more

Reveal

Data Access Governance: Why It Matters and How to Implement It

Reveal on

Organizations collect and store data for all kinds of reasons, from understanding their customers and anticipating market changes to measuring their performance over time and making strategic business decisions. But as...more

Polsinelli

Florida Imposes a Ban on Offshoring Storage of Medical Information

Polsinelli on

On May 8, 2023, Governor DeSantis signed Bill CS/CS/SB 264 amending the Florida Electronic Health Records Exchange Act. Effective July 1, 2023, this new law will require that the offsite storage of certain personal medical...more

McDermott Will & Emery

Key Takeaways | Global Perspectives on Data Sharing and Privacy

During this session, the panel discussed strategies and business considerations when addressing compliance with the wide array of data protection and privacy laws and regulations across the United States and abroad. The panel...more

Sheppard Mullin Richter & Hampton LLP

[Webinar] Data Beware! Defending Class Actions in the Privacy and Data-Sharing Space - June 13th, 10:00 am - 10:30 am PT

This presentation will discuss the recent surge in class actions challenging companies’ practices for collecting, sharing, and storing consumer data, including claims arising under the Illinois Biometric Information Privacy...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

Spilman Thomas & Battle, PLLC

Do You Know Your Data? The Dangers of Too Much Data and Not Cleaning House

It is imperative that a company knows what data it holds, why it is holding it, where it holds it, and who has access to it. The old adage that information is power leads many to believe that holding on to as much data as...more

Jackson Lewis P.C.

How Modern Manufacturing Plants Can Protect Against Ransomware, Cyberattacks

Jackson Lewis P.C. on

To help protect against criminal ransomware and cyberattacks, modern manufacturing plants should ensure they have reasonable physical, administrative, and technical safeguards in place....more

Conyers

Privacy and Data Breaches in the Cayman Islands

Conyers on

Since the introduction of the Data Protection Act (the “DPA”) in 2019, there has been a steady increase in the number of data protection breaches that have been reported to the Office of the Ombudsman. It is expected that...more

Lighthouse

As Employees Move, Keeping Data in All the Right Places Is Crucial

Lighthouse on

As the corporate workplace continues to evolve—encompassing hybrid work environments, bring your own device policies, and cloud-based storage—companies are well-advised to consider areas of increased vulnerability and whether...more

TransPerfect Legal

Changing the Automotive Narrative: Hacking Concerns & Wireless Communication Interfaces

TransPerfect Legal on

The automotive industry has been a tight-knit and exclusive club since the 1950s automobile boom. After months of distress caused by semiconductor chip shortages, assembly plant shutdowns, and higher prices, is that still the...more

Conyers

Understanding PIPA: Defining its Scope and Starting to Prepare

Conyers on

In a four-part series, Conyers will be diving into different topics relating to Bermuda’s privacy legislation, including: why we need privacy legislation and its purpose, how do we prepare for PIPA, the role and requirements...more

Fox Rothschild LLP

The German DSK Expert Opinion on FISA 702 Is Broader Than We Think

Fox Rothschild LLP on

The German Data Protection Conference (DSK) has issued an expert opinion on the state of surveillance laws in the United States. Needed: Schrems-proof mascara, the next level waterproof for all the “Cry and Pray” that...more

Jackson Lewis P.C.

The RIPTA Data Breach May Provide Valuable Lessons About Data Collection and Retention

Jackson Lewis P.C. on

Efforts to secure systems and data from a cyberattack often focus on measures such as multifactor authentication (MFA), endpoint monitoring solutions, antivirus protections, and role-based access management controls, and for...more

76 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide