News & Analysis as of

Risk Mitigation Personally Identifiable Information

Bricker Graydon LLP

Scammers, SSNs, and Smelling Funny

Bricker Graydon LLP on

I was hanging out with my friend this weekend, both catching up on emails from a coffee shop. After a while, he turned to me. “Well sh*t. Looks like my social security number might be on the dark web.”...more

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part II - E-Discovery Unlocked: Managing the E-Discovery Data Minefield - September 12th, 1:00 pm...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information. This...more

Association of Certified E-Discovery...

[Webinar] Uncovering E-Discovery Data Risks - How to Identify and Mitigate Hidden Threats Before It's Too Late - August 28th,...

Something keeping you up at night? It just might be the data risks hiding in your e-discovery process. Join us for an in-depth webinar on "Uncovering E-Discovery Data Risks: How to Identify and Mitigate Hidden Threats Before...more

Osano

[Event] Practical Privacy Workshop - June 21st, Atlanta, GA

Osano on

The Practical Privacy Workshop is a half day continuing education event designed to keep you informed on important topics, trends, and best practices in the world of data privacy. Join us for breakfast, presentations that...more

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

BakerHostetler

Byte-Sized Terms: Drafting AI Contracts That Generate Success

BakerHostetler on

As technology continues to evolve, the use of generative artificial intelligence (AI) in business operations is reshaping the way we approach standard tech transactions. The traditional pillars of contract negotiation –...more

Robinson+Cole Data Privacy + Security Insider

Red Cross Creates Rules for Civilian Hackers in Conflict Zones

The International Committee of the Red Cross (ICRC) has taken a new step to regulate the activities of civilian hackers in conflict zones. To address the rise in the involvement of civilian hackers in inter-state conflicts,...more

Ankura

Is Your DNA Safe? DNA Sequencing Machines Found to Contain Critical Vulnerabilities

Ankura on

Key Points: Illumina DNA sequencing machines are vulnerable to exploitation. Both the Cybersecurity and Infrastructure Security Agency (CISA) and the Food and Drug Administration (FDA) have published advisories urging all...more

K&L Gates LLP

Litigation Minute: Pixel Tools and the Video Privacy Protection Act (Pixel Tool Litigation Series: Part Two)

K&L Gates LLP on

What You Need to Know in a Minute or Less - Plaintiffs are making new use of an old statute, the Video Privacy Protection Act (VPPA), to challenge the use of pixel technology across a variety of websites that provide online...more

Kelley Drye & Warren LLP

[Webinar] 2023 Privacy Litigation Trends - February 15th, 12:00 pm - 1:00 pm ET

The proliferation of privacy-related law suits filed against a wide range of companies related to website tracking/analytics will continue in 2023, joining robocall and biometric privacy disputes. Join Kelley Drye Privacy...more

Rothwell, Figg, Ernst & Manbeck, P.C.

Learning From Data Breach Cases To Reduce Legal Risk

The average cost of a data breach is on the rise. According to the 2022 ForgeRock Consumer Identity Breach Report, the average cost in 2021 of recovering from a data breach in the U.S. is $9.5 million — an increase of 16%...more

Wilson Sonsini Goodrich & Rosati

FTC Announces Settlement with Drizly; Complaint Names CEO in His Individual Capacity

On October 24, 2022, the Federal Trade Commission (FTC) announced a proposed consent order against Drizly and its CEO, James Cory Rellas, over the online alcohol marketplace company’s data breach incident in 2020, which...more

Partridge Snow & Hahn LLP

Non-Profit Organizations Can Reduce Risks by Addressing Data Privacy Concerns in Advance

With the threat of cyber-attacks making the news, it is a good time for all non-profit organizations to review their policies and procedures with respect to data privacy. Many non-profit organizations are particularly...more

Guidepost Solutions LLC

Tax Benefits for Improving the C-Suite’s Security: A Look at IRS Code 132 and Working Condition Fringes

What if I told you that a security assessment of your business and residence could provide tax deductible expenses for private air transportation, a security driver, and executive protection agents and have favorable tax...more

Robinson+Cole Data Privacy + Security Insider

You Might Want to Rethink That New Meditation App

Researchers from the Mozilla Foundation reviewed the privacy policies of 32 mental health apps ranging from guided meditation to telehealth counseling services and flagged 28 of them as having “Privacy Not Included.” In...more

Health Care Compliance Association (HCCA)

Hybrid Workforces and Compliance with Sheila Limmroth

Hybrid work is likely here to say, and, as Sheila Limmroth, privacy specialist at DCH Health System, and the author of the chapter Hybrid Work Environment in the Complete Healthcare Compliance Manual observes in this...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #321 – California AG Warns Consumers About ID Theft from T-Mobile Breach

On March 2, 2022, California Attorney General Rob Bonta urged individuals affected by the T-Mobile breach in 2021 to take advantage of resources to assist with preventing or responding to identity theft. According to the...more

Holland & Knight LLP

The Impact of Cybersecurity Regulations on the Financial Services Industry in 2022

Holland & Knight LLP on

Following the SolarWinds and the Colonial Pipeline cyberattacks, the Biden Administration emphasized a shift toward mandatory cybersecurity requirements. Throughout 2021, government agencies issued new cybersecurity guidance,...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #313 – Data Breaches Aren’t Going Away Anytime Soon

According to The Identity Theft Research Center (ITRC), data breaches in 2021 surpassed the previous record year of 2020 by 17 percent. The incidents ranged from the theft of cryptocurrency (Livecoin went out of business...more

Reveal

Healthcare Organizations Must Deal with their Shadow Information Problem

Reveal on

A myopic focus on protecting EMR (Electronic Medical Records) systems has left healthcare organizations open to shadow information risk. In a world where hackers and ransomware criminals are regularly compromising healthcare...more

TransPerfect Legal

The Colonial Pipeline Ransomware: Know Where Your Key Data Lives, Decrease Your Threat Footprint

TransPerfect Legal on

The Colonial Pipeline ransomware attack was the largest in the energy sector to date, and with cybercrimes up 100% from 2019 to 2020 this is only the beginning for 2021. Many organizations are taking on a digital...more

Ankura

11 Months After Schrems II - How Are Organizations Addressing Risk?

Ankura on

Organizations are closely tracking which of their vendors previously relied on Privacy Shield. Separately, they are preparing Transfer Impact Assessments (“TIAs”) to evaluate and address risks associated with personal data...more

HaystackID

[Webcast Transcript] From the Enterprise to Individuals: Are You Mitigating Departing Employee Risk?

HaystackID on

On December 3, 2020, HaystackID shared an educational webcast designed to inform and update legal and data discovery professionals on considerations and approaches that can help organizations proactively and reactively...more

Womble Bond Dickinson

Best Practices for Managing Cyber Risks in a Cyber World

Womble Bond Dickinson on

The shift to a work-from-home economy has enabled companies and employees to continue functioning during the pandemic but one unintended consequence of this overnight transition has been the increased risk of cyberattacks....more

Kramer Levin Naftalis & Frankel LLP

The Diligence Process for Privacy and Data Security: Telltale Indicators of a Data Program’s Strengths and Weaknesses

The rapid expansion of data security and privacy laws and regulations — both in the United States and internationally — harbors the potential for substantial liability, with the consequence that cyber compliance has become an...more

92 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide