News & Analysis as of

Risk Management Data Protection

Carlton Fields

No Password Required: From AOL to Award-Winning Cuisine to High-Stakes Hacking

Carlton Fields on

Recorded live at the 2025 Sunshine Cyber Conference in Tampa, Jack Clabby of Carlton Fields and resident cybersecurity expert Kayley Melton, executive director of operations at the Cognitive Security Institute, sit down with...more

Blake, Cassels & Graydon LLP

New Guidance From Ontario’s Information and Privacy Commissioner on Privacy Management for Small Healthcare Organizations

Ontario’s Information and Privacy Commissioner (IPC) has released a new Privacy Management Handbook (Handbook) aimed at assisting small healthcare organizations to meet their privacy obligations under Ontario’s health...more

White & Case LLP

AI Watch: Global regulatory tracker - Colombia

White & Case LLP on

Despite congressional activity on AI in Colombia, regulation remains unclear and uncertain. Laws/Regulations directly regulating AI (“AI Regulations”) Currently, there are no specific laws, statutory rules, or regulations...more

Foley & Lardner LLP

AI Contracts in Health Care: Avoiding the Data Dumpster Fire

Foley & Lardner LLP on

For AI companies in the health care space, data is everything. It fuels model performance, drives product differentiation, and can make or break scalability. Yet too often, data rights are vaguely defined or completely...more

Falcon Rappaport & Berkman LLP

Navigating the Patchwork of State Consumer Privacy Statutes: An E-Commerce Compliance Playbook

Online retailers now face an increasingly complex matrix of state consumer-privacy statutes that impose prescriptive requirements on data collection, monetization, and cybersecurity practices. ...more

Herbert Smith Freehills Kramer

Protecting your business: The implications of Australia’s new privacy tort

On 10 June 2025, the new statutory tort for serious invasions of privacy came into force as part of a suite of privacy reforms passed last year, substantially enhancing privacy protections and signalling a material shift in...more

Reveal

How to Navigate FedRAMP Compliance for eDiscovery in Federal Agencies

Reveal on

96% of companies currently use the public cloud, but Gartner predicts that there's more to that reliance than a convenient source of digital storage. Their leading experts believe that the cloud will be a business necessity...more

White & Case LLP

AI Watch: Global regulatory tracker - Japan

White & Case LLP on

Japan adopts a soft law approach to AI governance but lawmakers advance proposal for a hard law approach for certain harms. Laws/Regulations directly regulating AI (“AI Regulations”) On May 28, 2025, Japan's Parliament...more

Davis Wright Tremaine LLP

NSA Issues Cybersecurity Guidance and Best Practices for AI Systems

The National Security Agency (NSA), in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and cybersecurity agencies from Australia, New Zealand, and the...more

K2 Integrity

[Webinar] Information Leaks: How to Respond, Investigate, and Protect Your Business - June 25th, 9:00 am ET

K2 Integrity on

Information leaks can range from exposures of internal decisions and salary data to the disclosure of intellectual property, strategy documents, or board minutes. Whether accidental or intentional, these leaks demand...more

White & Case LLP

AI Watch: Global regulatory tracker - Brazil (UPDATED)

White & Case LLP on

Brazil intends to regulate AI through Bill No. 2,338/2023 ("Brazil's Proposed AI Regulation"), although there are currently no specific codified laws, statutory rules or regulations in Brazil that directly regulate AI....more

Constangy, Brooks, Smith & Prophete, LLP

AI on the Job: How to Stay Ahead of Employment and Data Privacy Risks

AI is transforming the workplace—but regulation is racing to catch up. Organizations must now juggle complex risks at the intersection of hiring, workplace decision-making, employment law, and data privacy. Are you ready? ...more

Jones Day

EU Geopolitical Risk Update - Key Policy & Regulatory Developments No. 121

Jones Day on

This regular alert covers key policy and regulatory developments related to EU geopolitical risks, including in particular, economic security, Russia’s war against Ukraine, health threats, and cyber threats. It does not...more

Pillsbury - Global Sourcing Practice

New Changes to GDPR Proposed: An Indication of Shifting Policy Priorities?

The European Commission’s proposed amendments to the General Data Protection Regulation (GDPR) mark the first substantive reworking of the regulation since its enactment, signaling a material shift toward economic pragmatism....more

Morgan Lewis - Tech & Sourcing

The Latest Trends in Moving ERP Systems to the Cloud

According to Forbes, “in 2025, the landscape of enterprise resource planning (ERP) is set for a thrilling transformation,” with a shift toward cloud-native ERP solutions at the top of the list....more

Fox Rothschild LLP

Best Practices for Securing Data Used to Train and Operate AI Systems

Fox Rothschild LLP on

The National Security Agency’s Artificial Intelligence, Security Center (AISC), together with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Australian Signals...more

Katten Muchin Rosenman LLP

Privacy, Data and Cybersecurity Quick Clicks | Issue 29

Katten's Privacy, Data and Cybersecurity Quick Clicks is a monthly newsletter highlighting the latest news and legal developments involving privacy, data and cybersecurity issues across the globe....more

A&O Shearman

CMORG AI Taskforce releases comprehensive AI Baseline Guidance

A&O Shearman on

The Cross Market Operational Resilience Group's (CMORG) AI Taskforce has released its AI Baseline Guidance Review (dated January 2025), accompanied by a press release. The CMORG AI Taskforce conducted a baseline review of...more

Ankura

The Importance of Culture in an Effective Cybersecurity Program

Ankura on

While technology plays a pivotal role in cybersecurity, the human element is equally crucial. An organization's culture can significantly influence the effectiveness of its cybersecurity measures. A strong cybersecurity...more

Morrison & Foerster LLP

[Webinar] Caught in the Web: Untangling Challenges to Teen Online Safety Laws - June 3rd, 1:00 pm ET

Join Morrison Foerster’s global Privacy + Data Security Group for our masterclass webinar, “Caught in the Web: Untangling Challenges to Teen Online Safety Laws." We will break down the evolving legal landscape around teen...more

Osano

3 Ways GRC Pros Can Manage Privacy Risk (and Still Have Time to Sleep, Eat, and Relax)

Osano on

Governance, risk, and compliance (GRC) can feel like thankless work at times. You can’t ship risk mitigation to market. It's not usually reflected on your balance sheet. Only especially canny investors notice the absence of...more

Woodruff Sawyer

Fiduciary Duty in the Digital Age: Cybersecurity Best Practices for ERISA Plans

Woodruff Sawyer on

Cybercriminals look for two things when seeking a victim—access and opportunity. ERISA retirement plans offer both. Cybercriminals exploit weaknesses in systems, software, or human behavior to find opportunities for easy...more

King & Spalding

European Data Protection Board Report on AI Privacy Risks & Mitigations in Large Language Models

King & Spalding on

Large Language Models (“LLMs”) are a subset of artificial intelligence (“AI”) which use a type of machine learning called deep learning in order to understand how characters, words, and sentences function together. The advent...more

Barnea Jaffa Lande & Co.

Internal Enforcement and Compliance Surveys: Essential for Organizations in Israel

In an era of stringent regulations and increasing legal risks, it has become essential for organizations to implement internal enforcement programs. However, in order for such programs to provide legal protection, they must...more

Katten Muchin Rosenman LLP

Choose your GenAI model providers, models, and use cases wisely

Generative AI (GenAI) vendors, models, and uses cases are not created equal. Model providers must be trusted to handle sensitive data. Models, like tools in a toolbox, may be better suited for some jobs than others. Use cases...more

1,584 Results
 / 
View per page
Page: of 64

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide