News & Analysis as of

Security and Privacy Controls Data Protection Cybersecurity

Ogletree, Deakins, Nash, Smoak & Stewart,...

New DHS Security Requirements Impact Compliance for Employers with Workers in Six “Countries of Concern”

The U.S. Department of Homeland Security (DHS) recently published new security requirements for certain restricted transactions covered by the U.S. Department of Justice’s (DOJ) sensitive data export rules. ...more

Epiq

After a Data Breach: Navigating Long-Tail Legal and Financial Risks

Epiq on

In recent years, data breaches have escalated from isolated technical issues to significant legal battles. Businesses are witnessing a sharp rise in data breach lawsuits, underscoring the growing legal risks associated with...more

Winstead PC

Top Data Privacy & Cybersecurity Considerations in 2025 for RIAs

Winstead PC on

Compliance and Regulations - Ensure adherence to SEC regulations with appropriate privacy and cybersecurity policies tailored to SEC requirements....more

Wyrick Robbins Yates & Ponton LLP

Cookie Cutter: NY AG Announces Cookie Scrutiny with Business Guide to Website Privacy Controls

Website privacy controls—in the form of banners and pop-ups asking visitors to agree to, or reject, a website’s use of cookies, pixels, and similar technologies used to track their behavior—are becoming ubiquitous. In the...more

Holland & Knight LLP

SEC Cyber Enforcement Update: Which Way Are the SolarWinds Blowing?

Holland & Knight LLP on

The SEC has been aggressively pursuing cybersecurity investigations and enforcement actions against public companies and foreign private issuers. In these actions, the SEC often alleges one of two theories: 1) that the...more

Esquire Deposition Solutions, LLC

Actionable Advice When Sharing Client Data with Vendors

We’ve previously written on the need for law firms to scrutinize the data security protections in place at all third-party vendors who have access to client confidential information. Clearly, that’s still good advice....more

Furia Rubel Communications, Inc.

Embracing Data Privacy to Drive Business Growth with Aihong Yu, Chief Privacy Counsel of CDK Global

In this episode of On Record PR, Gina Rubel goes on record with Aihong Yu, Chief Privacy Counsel of CDK Global, to discuss how embracing privacy and security measures…...more

BCLP

Work From Home Cybersecurity Basics: Incident Response Planning in a WFH Environment (United States)

BCLP on

As the Covid-19 Pandemic forces more employees than ever before to work from home (“WFH”), businesses face new and different data privacy and security risks. This change is not lost on U.S. regulators, but it does not mean...more

BCLP

Work From Home Cybersecurity Basics: Following Company Practices (United States)

BCLP on

As the Covid-19 Pandemic forces more employees than ever before to work from home (“WFH”), businesses face new and different data privacy and security risks. This change is not lost on U.S. regulators, but it does not mean...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

Looming Data Security Requirements Under the New York SHIELD Act: What Businesses Need to Know

By March 21, 2020, nearly every business - not only those that conduct business in New York State - that owns or licenses computerized data that includes the private information of any New York State resident, will be...more

Barnea Jaffa Lande & Co.

Protect Your Business by Learning How to Handle Data

We are living in the age of data and big data, where everyone wants to collect as much information as possible. The ability to analyze and monetize such information is a key strategy and selling point for many businesses. ...more

Jackson Lewis P.C.

New York SHIELD Act FAQs

Jackson Lewis P.C. on

Over the past few months, businesses across the country have been focused on the California Consumer Privacy Act (CCPA) which dramatically expands privacy rights for California residents and provides a strong incentive for...more

BCLP

What Companies Need to Know to Comply with the NY SHIELD Act

BCLP on

On March 21, 2020, companies will need to comply with yet another data privacy and security law when the New York Stop Hacks and Improve Electronic Data Security Act ("NY SHIELD Act") takes effect. The SHIELD Act is unique in...more

Harris Beach Murtha PLLC

New York Board of Regents Approves Part 121 Regulations Required by Education Law § 2-d

January 14, 2020, the Board of Regents formally adopted Part 121 to the Commissioner’s Regulations to implement Education Law § 2-d. The regulation will become effective January 29, 2020. This regulation primarily addresses...more

Williams Mullen

CCPA: Implementing the Right Cybersecurity Plan Is Now a Legal Issue

Williams Mullen on

Addressing cybersecurity risks invariably involves very technical matters. As a result, in many companies the IT department has been responsible for developing and implementing cybersecurity plans and procedures....more

ArentFox Schiff

Prepare the Battlements! What Businesses Need to Know About the NY SHIELD Act

ArentFox Schiff on

As security risks continue to be at the forefront of legislators’ agendas across the country, New York has joined the growing roster of states pressing businesses to develop more robust breach procedures. Originally proposed...more

Pillsbury Winthrop Shaw Pittman LLP

Nonprofits and New Cybersecurity and Privacy Laws in New York and California

New cybersecurity and data privacy laws will impose substantial new obligations on businesses that collect information about residents of those states. Regardless of their location or size, nonprofit organizations that...more

Pillsbury Winthrop Shaw Pittman LLP

New York Expands Cybersecurity and Data Breach Law

New law in New York State extends requirements on companies doing business with New York residents to have cybersecurity programs and expands New York’s breach notification requirements. New law extends the reach of New...more

Harris Beach Murtha PLLC

With SHIELD Act, New York State Requires Enhanced Protection of Residents' Private Data

Just prior to the sweltering hot weekend, Governor Cuomo signed into law the Stop Hacks and Improve Electronic Data Security Act, or SHIELD Act. Taking effect on March 22, 2020, the law imposes new obligations on entities to...more

Williams Mullen

Due Diligence of Corporate Data Assets In M&A Transactions: Data Protection/Privacy

Williams Mullen on

As data are quickly becoming significant corporate assets, lawyers need to help companies both maximize the value of their data and protect the business against any associated risks. This is particularly true in M&A...more

Sands Anderson PC

New Cybersecurity Threat Identification and Prevention Guidance from HHS

Sands Anderson PC on

As a result of ongoing efforts under the Cybersecurity Act of 2015, the Department of Health and Human Services (HHS) has partnered with public and private sector entities to develop guidance for healthcare entities seeking...more

Littler

Future Workforce - 2018 Thought Leadership Roundtable Report

Littler on

The development and deployment of increasingly sophisticated artificial intelligence (AI), robots, and other automated systems are transforming workplaces globally, redefining needed workforce roles, skills, and jobs, and...more

A&O Shearman

SEC Brings Enforcement Action Against Broker-Dealer For Deficient Cybersecurity Procedures

A&O Shearman on

On September 26, 2018, the United States Securities and Exchange Commission (“SEC”) announced a $1 million settlement with an Iowa-based broker-dealer over allegations that it maintained deficient cybersecurity policies and...more

Eversheds Sutherland (US) LLP

The SEC wants companies to talk about cybersecurity

On February 21, 2018, the Securities and Exchange Commission issued an interpretive release1 providing important guidance to certain registrants on cybersecurity disclosure. Coming on the heels of dozens of high-profile...more

Benesch

Beyond Care, Custody, and Control: Data Security Best Practices for the Transportation and Logistics Sector

Benesch on

The receipt, storage, and handling of sensitive shipper data occurs, often frequently and in real-time, alongside the flow of goods. Commercial shippers are well aware of the supply chain security risk to the materials and...more

43 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide