News & Analysis as of

Information Technology Employee Training

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #444 – Best Phishing Campaigns are from HR or IT

Everyone thinks they can spot a phish. Whether it is an email, SMS text, or QRish phishing, people have an overinflated view of their capabilities to detect them....more

Amundsen Davis LLC

Bringing AI Out of the Shadows: How to Manage the Use of AI in Your Workplace

Amundsen Davis LLC on

Artificial intelligence (AI) is everywhere these days, including your workplace. While there is no one-size-fits-all AI policy that will work for every company, here are our general thoughts about how employers can...more

Gardner Law

Responding to CIDs and Other Government Information Requests: A Practical Guide for FDA-Regulated Companies

Gardner Law on

Understanding Your Obligations and Protecting Your Rights - Government investigations are a reality for businesses operating in FDA-regulated industries. While the previous webinar focused on general preparedness, this...more

Husch Blackwell LLP

NYDFS Warns Against the Threat of Accidentally Hiring North Korean Remote IT Workers

Husch Blackwell LLP on

Keypoint: The New York State Department of Financial Services (NYDFS) issued an industry letter outlining the threats posed to U.S. companies who hire remote technology workers linked to North Korea and may embezzle funds...more

TransPerfect Legal

Study Period: What to Do When the Canadian Competition Bureau Starts a Market Study of Your Industry

TransPerfect Legal on

Recent (and ongoing) amendments to the Competition Act have resulted in several new powers for the Competition Bureau, which may have significant and far-reaching implications for businesses in Canada. One such amendment...more

Fisher Phillips

You Can No Longer Believe What You See: 5 Ways Employers Can Guard Against Deepfakes

Fisher Phillips on

In their book, “AI 2041: Ten Visions for Our Future,” Kai-Fu Lee and Chen Qiufan point out that we used to live in a world where we could trust video evidence, but not anymore. Thanks to deepfakes – sophisticated digital...more

Jackson Lewis P.C.

Importance of Protecting Employee Information as Privacy and Cybersecurity Laws Proliferate

Jackson Lewis P.C. on

Most human resources professionals are concerned about the privacy and security of the vast amounts of personal information they manage. This article discusses steps to consider taking against the challenges. Deluge of...more

The Volkov Law Group

The Cyber Compliance Imperative: Bringing Employees Together with Technology (Part III of IV)

The Volkov Law Group on

It is easy to get lost in the technology world of cyber security – the information technology business relies on lots of acronyms, techno-speak and function-specific terminology.  In responding to a cyber and data security...more

StoneTurn

Trust and National Security: Lessons for Business Insider Threat Programs

StoneTurn on

The recent arrest and criminal charges against Airman First Class Jack Teixeira for the alleged posting of classified and sensitive information on social media is yet another example of the significant risk that trusted...more

J.S. Held

Water Cybersecurity? EPA Mandates Regulations to Prevent Cyberattacks on Public Water Systems

J.S. Held on

EPA Aims to Mitigate Risk of Cyberattack on Public Water Systems On March 3, 2023, the U.S. Environmental Protection Agency (EPA) issued its Memorandum Addressing Public Water System (PWS) Cybersecurity in Sanitary Surveys or...more

Vinson & Elkins LLP

eDiscovery Pitfalls in a Remote World

Vinson & Elkins LLP on

In the last few years, remote work has proliferated, and with it the discovery process has become more complicated. With work-from-home as an option (if not the norm) in many industries, company data is commonly being...more

Mitratech Holdings, Inc

What is Citizen Development?

Are you looking to empower employees at every level of your organization with the no-code tools to streamline, standardize, and improve processes? A 2021 study by productiv found that each department in an enterprise uses...more

NAVEX

[Webinar] Are the 2022 Top 10 Risk & Compliance Trends Still Trending? - July 28th, 10:00 am PDT

NAVEX on

In January, we presented our annual top risk and compliance predictions that will impact organizations most in 2022. However, things move quickly in today’s risk world, and a mid-year check-in with Kristy Grant-Hart and...more

NAVEX

The New Normal Workplace (pt. 1) – R&C Management

NAVEX on

Most businesses began 2021 with ambitions to return to the office. But in keeping with a trend of disruption, we are faced with new COVID variants, questions on when and how schools will respond, a cultural shift towards...more

NAVEX

IT and Corporate Compliance: Bridging the Gap in the Era of Remote and Hybrid Work

NAVEX on

In many ways, the COVID-19 pandemic has served as a prime example of punctuated equilibrium. Shifts that have been slowly building for decades seemingly occurred overnight, giving us the contradictory sense that these changes...more

Fisher Phillips

Not If But When: Cybercrime Targets Telework

Fisher Phillips on

As a result of the COVID-19 pandemic, millions of Americans have deserted the physical workplace. Modern technology and remote access capabilities have made it possible to transform almost any job to a telework position. As...more

NAVEX

4 Ways to Protect ePHI Beyond HIPAA Compliance

NAVEX on

Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more

Seyfarth Shaw LLP

Where the President and Democratic Candidates Stand on Preparing for the Future of Work

Seyfarth Shaw LLP on

Seyfarth Synopsis: In our fourth installment on the presidential candidates’ stances on future of work issues, we focus on their approach to training employees for a highly technical workplace, and how they plan on investing...more

Robinson+Cole Data Privacy + Security Insider

2018 Cyber Incident & Breach Trends Report “All Bad”

The Internet Society’s Online Trust Alliance just released its 2018 Cyber Incident & Breach Trends Report, which says “2018–Some Better, Some Worse, All Bad.” That’s our experience, too. Below are our highlights from the...more

Bradley Arant Boult Cummings LLP

Understanding cyber insurance risks of target companies

Due to the dramatic increase and changing nature of cyber risks, mergers and acquisitions due diligence should expand to address cyber risks, available risk mitigation practices, and available insurance. Acquiring companies...more

Holland & Knight LLP

2018 NDAA Analysis: Acquisition Workforce Improvements

Holland & Knight LLP on

This is the sixth blog post in a series of blogs analyzing the current draft of the 2018 National Defense Authorization Act (NDAA) as agreed-to by House and Senate negotiators on November 8, 2017. Stay tuned for additional...more

McManis Faulkner

Cybersecurity Awareness Month: How to Protect Your Firm Against Cyber Threats

McManis Faulkner on

October is Cybersecurity awareness month. Now is a better time than ever to look at your current practices at the office and even at home. It is important to know that we all play a role in keeping our work and personal data...more

McAfee & Taft

Gavel to Gavel: Preventing data breaches

McAfee & Taft on

The risk data breaches and cyberattacks pose to small businesses cannot be overstated. Roughly half experienced a breach within the past year at an average cost of $665,000 and immeasurable lost revenue. Worse yet,...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #35 – Employees still careless—don’t be that employee

According to a study by Softchoice, 1-in-5 employees still keep their passwords in plain sight (like a Post-it Note on their desk or in the top drawer of their desk—now that’s original), have accessed work files from a device...more

Foley Hoag LLP - Security, Privacy and the...

Advanced Cyber Security Center Panel Explores Reasonableness in Cybersecurity

I had the pleasure of moderating an excellent panel at the Advanced Cyber Security Center’s annual conference on November 4. The panel’s topic for discussion was “What is Reasonable in Cybersecurity: Responsibility and...more

27 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide