News & Analysis as of

Risk Management Data Protection

Baker Botts L.L.P.

23andMe’s $30M Settlement: What It Means for Companies Handling Genetic and Genomic Data

Baker Botts L.L.P. on

The recent $30 million settlement between 23andMe and 6.4 million users following a major data breach offers important lessons for businesses dealing with sensitive genetic and genomic information....more

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part III - Digital Forensics in your Incident Response Plan - September 19th, 1:00 pm - 2:00 pm...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more

A&O Shearman

Data Governance: Strategic Convergence, Opportunities and Risks

A&O Shearman on

AI is accelerating digital transformation for companies and data governance is a key pillar in this change, enabling data strategies that unlock the potential of AI, and mitigate the risks associated with its use. Data...more

J.S. Held

Strategies to Avoid Cyber Insurance Claim Challenges: Part I

J.S. Held on

Cyber risk is now a normal part of our personal and professional lives. When companies suffer a cyber incident, they often look to their insurance policy for coverage to help mitigate the financial exposure. Additional...more

Cozen O'Connor

DOJ and FTC Secure $2.95 Million Settlement for Alleged CAN-SPAM Act Violations

Cozen O'Connor on

The U.S. DOJ settled with Verkada Inc., a cloud-based building security company that sells security cameras and other physical security products, to resolve allegations that its data security and email practices violated the...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, V 5, Issue 7, August 2024

Welcome to our seventh 2024 issue of Decoded - our technology law insights e-newsletter. We have a few events we want to pass along to those interested in technology, but also other areas of law and business. ...more

Cozen O'Connor

Missouri AG Investigates Hack of National Public Data

Cozen O'Connor on

Missouri AG Andrew Bailey has opened an investigation into Jerico Pictures, Inc. d/b/a National Public Data, a background check data aggregator, over a data breach that has allegedly exposed personally identifiable...more

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part II - E-Discovery Unlocked: Managing the E-Discovery Data Minefield - September 12th, 1:00 pm...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information. This...more

Mayer Brown

HKMA Enhanced Consumer Protection in the Use of GenAI by Authorized Institutions in Hong Kong

Mayer Brown on

The Hong Kong Monetary Authority (HKMA) has imposed additional principles on the use of big data analytics and artificial intelligence (BDAI) and specifically, generative artificial intelligence (GenAI) by authorized...more

Warner Norcross + Judd

Managing Cybersecurity Risk for Family Offices and Businesses

Warner Norcross + Judd on

Whether caused by family member thoughtlessness, employee error or the acts of a skilled data thief, everyone is likely to be the victim of an information breach at some point. A cyberattack on a family office or family...more

Society of Corporate Compliance and Ethics...

[Webinar] Navigating the Changing Cybersecurity Landscape - September 12th, 12:00 pm - 1:30 pm CT

Learning Objectives: - Gain an understanding of recent changes to the cyber security landscape - Where to start: elevate your cyber security risk management - Educate on the future of cyber security in healthcare and...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #411 – Phishing Attacks Increased 40% in 2023

Everyone thinks they can spot a phishing email. If true, we would not see so many security incidents, data breaches, and ransomware attacks. The statistics are overwhelming that phishing emails are a significant cause of data...more

Woodruff Sawyer

Running to Stand Still: Practical Cybersecurity Governance Considerations for Boards and Management Teams

Woodruff Sawyer on

It’s obvious that strong cybersecurity governance should help to reduce a company’s risk of succumbing to a cybersecurity incident or being significantly impacted should one materialize. One major challenge: determining what...more

Dunlap Bennett & Ludwig PLLC

The New Guidance From DOL On Using AI In The Workplace

A recent Executive Order from the Biden administration noted the “promise and peril” of artificial intelligence (AI). For instance, AI has the potential to transform the workplace in unprecedented ways. Its capabilities range...more

Lathrop GPM

Is AI Putting Your Closely Held Business at Risk?

Lathrop GPM on

Business leaders are considering new AI tools that grow more sophisticated each day. For closely held businesses on the lookout for innovative and tech-enabled cost savings, AI can offer a competitive edge by taking on...more

Skadden, Arps, Slate, Meagher & Flom LLP

New UK Government Announces AI and Cybersecurity Reforms

Last month the new Labour government in the UK announced in the King’s Speech that it will introduce new artificial intelligence (AI) rules alongside cybersecurity and digital information bills. A brief overview of these...more

Association of Certified E-Discovery...

[Webinar] Uncovering E-Discovery Data Risks - How to Identify and Mitigate Hidden Threats Before It's Too Late - August 28th,...

Something keeping you up at night? It just might be the data risks hiding in your e-discovery process. Join us for an in-depth webinar on "Uncovering E-Discovery Data Risks: How to Identify and Mitigate Hidden Threats Before...more

Conn Kavanaugh

Navigating the Artificial Intelligence Landscape: What Businesses Need to Know

Conn Kavanaugh on

Artificial Intelligence (“AI”) generated a tremendous amount of excitement in 2023 as businesses rushed to build use cases and deploy AI tools throughout their organizations. AI has evolved from a futuristic concept into a...more

Foley & Lardner LLP

Artificial Intelligence in Recruitment: It’s Algorithmic, But It May Not Be Private

Foley & Lardner LLP on

The past few years have seen a sharp increase in the use of artificial intelligence (AI) across a variety of industries and workplaces. Many businesses have implemented AI to help streamline the recruitment and hiring process...more

Mayer Brown

New EU Cyber Rules: Implementation of NIS2 in the EU Member States

Mayer Brown on

The Network and Information Security 2 Directive (EU) 2022/2555 ("NIS2") entered into force on 16 January 2023. NIS2 sets cyber rules for organizations whose services are considered essential or important for maintaining...more

A&O Shearman

Zooming in on AI: When will the AI Act apply?

A&O Shearman on

EU Regulation 2024/1689, also known as the Artificial Intelligence Act (AI Act), enters into force as of 1 August 2024. But when will it become applicable? The AI Act sets out a harmonized legal framework for the...more

Jones Day

SEC v. SolarWinds: Court Rejects SEC Authority Over Cybersecurity Controls and Most Alleged Disclosure Violations

Jones Day on

The U.S. District Court for the Southern District of New York dismissed the majority of claims that the Security and Exchange Commission ("SEC") asserted against SolarWinds, including claims that the company's alleged...more

Troutman Pepper

US EPA Warns of Fraudulent NOVs

Troutman Pepper on

Phishing scams can pop up anywhere, as evidenced by the U.S. Environmental Protection Agency (EPA) Office of Inspector General’s recent alert regarding fraudulent Notice of Violation letters (NOVs)....more

Orrick, Herrington & Sutcliffe LLP

RegFi Episode 42: Beyond the Breach: The CISO’s Role as a Strategic Risk Manager

RegFi co-hosts Jerry Buckley and Sherry Safchuk welcome Orrick partner Aravind Swaminathan for a conversation exploring the critical and evolving role of the Chief Information Security Officer in today’s corporate landscape.....more

Robinson+Cole Data Privacy + Security Insider

Scattered Spider Using RansomHub and Qilin Ransomware Against Victims

We previously reported on the concerning mash-up of worldwide cybercriminals, known as Scattered Spider, working together to attack victims. New reports from Microsoft and others indicate that in the second quarter of...more

1,207 Results
 / 
View per page
Page: of 49

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide