News & Analysis as of

Encryption Data Privacy

Fisher Phillips

Protecting Data While Traveling Internationally: An Employer’s Guide for Foreign Nationals and Other Global-Traveling Workers

Fisher Phillips on

International travel may pose serious data security risks – especially for your foreign national workers carrying sensitive, proprietary, or regulated information. Travelers must be aware of potential border inspections,...more

Pillsbury - Internet & Social Media Law Blog

Why Your Organization Should Be Thinking About Quantum Computing and the Future of Encryption

Quantum computing (QC) is poised to disrupt cybersecurity in ways that business leaders and legal professionals cannot afford to ignore. But what exactly is quantum computing, why does it pose such a significant threat to...more

U.S. Legal Support

Security Best Practices for Remote Depositions in the Digital Age

U.S. Legal Support on

Trial outcomes often hinge on witness testimony. Attorneys collect much of this testimony during a formal process called a deposition. A critical component of discovery, depositions traditionally occur in law offices or...more

Holland & Hart LLP

E-mailing and Texting PHI: Beware HIPAA

Holland & Hart LLP on

The HIPAA Privacy and Security Rules require covered entities (including healthcare providers and health plans) and their business associates to protect patient information stored or transmitted electronically, including...more

HaystackID

The Great Encryption Standoff: Apple vs. the UK’s Surveillance Push

HaystackID on

In the quiet corridors of Apple’s headquarters, executives face a decision that could reshape the future of digital privacy for billions of users worldwide. The catalyst? A controversial order from the United Kingdom’s...more

ArentFox Schiff

Proposed Changes to the HIPAA Security Rule: What Regulated Entities Need to Know

ArentFox Schiff on

In the final days of the Biden Administration, the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) issued a notice of proposed rulemaking (NPRM) to modify the Security Rule under the Health...more

King & Spalding

Biden Administration’s Eleventh-Hour Executive Order Imposes New Software Requirements on Companies

King & Spalding on

On January 16, 2025, President Biden issued Executive Order 14144 on Strengthening and Promoting Innovation in the Nation’s Cybersecurity (the “EO”). Building on prior initiatives such as Executive Order 14028 and the...more

Arnall Golden Gregory LLP

OCR Issues Proposed Rule to Strengthen Cybersecurity for ePHI

The Office for Civil Rights (“OCR”) under the U.S. Department of Health and Human Services (“HHS”) recently issued a Notice of Proposed Rulemaking (the “Proposed Rule”) to modify the Health Insurance Portability and...more

Cooley LLP

Federal Law Enforcement Recommends Encrypted and Ephemeral Messaging

Cooley LLP on

In light of recent reports of cyberattacks on telecommunications companies, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) issued a series of reports and statements recommending secure communications,...more

Stoel Rives - Global Privacy & Security Blog®

A Deeper Dive into the Proposed Modifications to the HIPAA Security Rule

“Through December 20, 2024, 575 security incidents involving unsecured protected health information affecting 500 or more individuals had been reported to Health and Human Services. Through the same date in 2023, 265...more

Dinsmore & Shohl LLP

New Year, New HIPAA Security Rule?

Dinsmore & Shohl LLP on

Citing the “alarming growth” of cyberattacks in recent years, the U.S. Department of Health and Human Services (“HHS”) has issued a Notice of Proposed Rulemaking to modify the Health Insurance Portability and Accountability...more

Benesch

Mixed Messages: The Salt Typhoon Encryption Debacle

Benesch on

While the balance of security, privacy, and public safety has always been a concern, recent cyberattacks have highlighted conflicting guidance by United States government officials, creating potential pitfalls for businesses....more

HaystackID

Unpacking iOS 18’s New Privacy Features – A Digital Forensics Perspective

HaystackID on

With every iOS update, Apple continues to tighten its grip on user privacy. The newly introduced iOS 18 is no different, bringing a suite of privacy features that are bound to make our lives as digital forensic experts a tad...more

Mitratech Holdings, Inc

Caution! Credential Stuffing on the Rise

If you have a tendency to reuse the same password across multiple accounts, you could be leaving yourself (and your organization) exposed to risk. Credential stuffing, the stealthy technique fueling a recent explosion of...more

Integreon

Thomson Reuters: Achieving Compliance With Your Law Enforcement and Third-party Subpoena Response Process

Integreon on

This article originally appeared on Thomson Reuters Westlaw Today on February 12, 2024. View the original article here. Robert Daniel and Mark Grant of Integreon, Inc. explore areas legal operations professionals should...more

Fisher Phillips

Ransomware Costs Businesses Record-High $1 Billion in 2023: Your 5-Step Plan to Prevent Attacks in 2024

Fisher Phillips on

2023 was the most devastating year yet for ransomware attacks, with businesses forking over $1 billion in ransom payments for the first time ever – and 2024 is expected to be even worse. Beyond the payments, the average cost...more

Spilman Thomas & Battle, PLLC

Are Automakers Making Sufficient Efforts to Protect Customer Data?

With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National Highway Traffic Safety Administration (“NHTSA”) has broad regulatory...more

HaystackID

[Webinar] Targeted Remote Collections for iOS and Android Devices: Challenges and Considerations for Sourcing Tools and Teams -...

HaystackID on

The digital landscape is constantly evolving, and with it, the challenges faced by digital forensics and eDiscovery collections professionals. Join our expert panel as they discuss targeted remote collections for iOS and...more

American Conference Institute (ACI)

[Event] 13th Advanced Forum on Global Encryption, Cloud & Cyber Export Controls - March 29th - 30th, San Francisco, CA

Hosted by American Conference Institute, the 13th Advanced Forum on Global Encryption, Cloud & Cyber Export Controls returns for another exciting year with curated programming that will dive into the intricacies of...more

Perkins Coie

Four Data Security Safeguards the FTC Would Like Companies To Adopt in 2023

Perkins Coie on

Data security will undoubtedly remain an enforcement priority for the Federal Trade Commission in 2023. A presentation on the FTC’s approach to data security by Deputy Chief Technologist Alex Gaynor at a Commission open...more

Holland & Knight LLP

Quantum Computing: The Looming Threat of Quantum Decryption

Holland & Knight LLP on

Every portion of a home relies on a solid foundation. If that foundation fails, then everything above it could also be compromised. Many systems work this way: There are one or more critical elements that act as their...more

Paul Hastings LLP

Data Privacy and Cybersecurity New Laws and Regulations Report

Paul Hastings LLP on

Throughout 2022, we continue to see regulators placing an emphasis on the importance of protecting and securing information, in particular consumer personal information, at both the federal and state levels. ...more

Fisher Phillips

NFTs Aren’t Just Revolutionizing Art, Sports, and Videogames – They’re Changing the Future of Employment

Fisher Phillips on

NFTs – or non-fungible tokens – are increasingly popular among artists, sports figures, and the video game industry. But NFTs (some selling for upwards of eight figures) are not just for gamers, Mark Cuban, and the ultra...more

Womble Bond Dickinson

Will NeuralHash Make a Hash of Privacy?

Womble Bond Dickinson on

Our personal technology is so complex that making a change in one aspect is likely to affect us in many ways. When tech companies step into social issues, we are likely to see unintended consequences....more

Womble Bond Dickinson

Preparing for the Post-Quantum Migration: A Race to Save the Internet

Womble Bond Dickinson on

Most people don’t know, or care to know, about cryptography. Without cryptography, the internet privacy that we all rely on for transmitting virtually all forms of digital communication would be insecure from attackers. Our...more

116 Results
 / 
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide