News & Analysis as of

Security and Privacy Controls Risk Management

BakerHostetler

FTC Signals Heightened Scrutiny on the Security of APIs

BakerHostetler on

On Jan. 15, the Federal Trade Commission (FTC) announced a proposed settlement with web hosting giant GoDaddy over alleged violations of Section 5 of the FTC Act. Specifically, the FTC alleged that GoDaddy had violated the...more

BCLP

Pressure-Testing Your Privacy Program for 2025

BCLP on

With the onslaught of new privacy, AI and cyber legislation coupled with promises for enforcement and class action litigation, running a well-functioning and flexible privacy and cyber program is increasingly a critical...more

Epiq

After a Data Breach: Navigating Long-Tail Legal and Financial Risks

Epiq on

In recent years, data breaches have escalated from isolated technical issues to significant legal battles. Businesses are witnessing a sharp rise in data breach lawsuits, underscoring the growing legal risks associated with...more

Winstead PC

Top Data Privacy & Cybersecurity Considerations in 2025 for RIAs

Winstead PC on

Compliance and Regulations - Ensure adherence to SEC regulations with appropriate privacy and cybersecurity policies tailored to SEC requirements....more

Goodwin

The NIS 2 Era Is Here: Are You Compliance-Ready?

Goodwin on

With the deadline for Member States to transpose the European Union’s updated Network and Information Systems Directive (Directive (EU) 2022/2555) (NIS 2 or Directive) into national law, with the Directive having passed on 18...more

Lighthouse

Enhancing Compliance and Security Operations with AI

Lighthouse on

Summary: If you're tackling compliance and security challenges in an AI-driven world, this post is essential. Discover how Microsoft Purview and Copilot for Security streamline processes, enhance security, and boost...more

Lathrop GPM

Is AI Putting Your Organization at Risk?

Lathrop GPM on

AI tools often drive efficiency and save money, but they have drawbacks. Here’s what to know....more

Nutter McClennen & Fish LLP

Are You Using AI to Process Consumer Information? Revisit Your Privacy Policy First!

What is a Privacy Policy? A company’s privacy policy details its commitments regarding the handling and use of consumer data. The policy must explicitly define the company’s practices for collecting, storing, processing, and...more

BakerHostetler

Looking in the Mirror: HHS OIG Audit Demonstrates HHS Agency’s Own Need for Focus on Cloud Security

BakerHostetler on

The OIG, the nation’s leader in fighting fraud, waste and abuse of Medicare, Medicaid and other HHS programs, periodically publishes reports on how federal healthcare programs could improve....more

Holland & Knight LLP

SEC Cyber Enforcement Update: Which Way Are the SolarWinds Blowing?

Holland & Knight LLP on

The SEC has been aggressively pursuing cybersecurity investigations and enforcement actions against public companies and foreign private issuers. In these actions, the SEC often alleges one of two theories: 1) that the...more

BakerHostetler

The SEC’s Regulation of Cybersecurity Continues

BakerHostetler on

The Securities and Exchange Commission entered into a resolution agreement with R.R. Donnelley & Sons (RRD) on June 18, 2024 with RRD agreeing to pay $2.125 million to resolve disclosure and control violations alleged by the...more

Fenwick & West LLP

Cyber Resilience After the Change Healthcare Breach

Fenwick & West LLP on

More than two months after the February 2024 Change Healthcare cyber-ransom attack, the healthcare industry continues to grapple with the fallout, creating significant challenges, disruptions, and outages to the healthcare...more

Benesch

Annual Report to Congress on Breaches of Unsecured Protected Health Information

Benesch on

The U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR) recently published an executive summary (Report) outlining key enforcement activities of the Health Insurance Portability and...more

Morris, Manning & Martin, LLP

Navigating Work Calls Without Privacy

A BP executive's husband pleaded guilty to securities fraud for buying and selling stock of BP's merger target. He knew of the upcoming transaction because he and his wife worked from home approximately 20 feet from each...more

Robinson+Cole Data Privacy + Security Insider

Tune Up Processes Around Passwords and Access Controls

A new report from Beyond Identity focuses on old, but very important issues—ending  access rights to network systems by terminated employees and the rampant sharing of passwords....more

NAVEX

4 Things to Know About Updated NIST 800-53 Standards

NAVEX on

[author: Matt Kelly] In September 2020 the National Institute of Standards and Technology (NIST) unveiled the fifth version of its cybersecurity standard formally known as SP 800-53, “Security and Privacy Controls for...more

BCLP

Work From Home Cybersecurity Basics: Incident Response Planning in a WFH Environment (United States)

BCLP on

As the Covid-19 Pandemic forces more employees than ever before to work from home (“WFH”), businesses face new and different data privacy and security risks. This change is not lost on U.S. regulators, but it does not mean...more

Nutter McClennen & Fish LLP

COVID-19 Security Alert: 10 Reminders for Employees Working Remotely

The security and confidentiality of a company’s data is paramount. As businesses grapple with the COVID-19 pandemic and the need for employees to work remotely, it is important to remain focused on ensuring the security and...more

Miller Canfield

Cybersecurity and Business Liabilities to Avoid When Using Remote-Work Technology

Miller Canfield on

As employers respond to the ongoing COVID-19 coronavirus pandemic, many are implementing work-from-home policies and establishing situational teleworking opportunities for their employees. While remote-work technology can...more

Barnea Jaffa Lande & Co.

Protect Your Business by Learning How to Handle Data

We are living in the age of data and big data, where everyone wants to collect as much information as possible. The ability to analyze and monetize such information is a key strategy and selling point for many businesses. ...more

Latham & Watkins LLP

The Pervasive Threat of Business Email Compromise Fraud - and How to Prevent It

Latham & Watkins LLP on

Eliminating the risk of business email compromise (BEC) attacks requires all parties to a financial transaction to pay close attention to email security, financial controls, and communication protocols. Key Points: ...more

Faegre Drinker Biddle & Reath LLP

The SEC’s Most Detailed Cybersecurity Guidance to Date

The SEC, through its Office of Compliance Inspections and Examinations (“OCIE”), recently issued its most detailed cyber guidance to date. OCIE had previously issued several cybersecurity risk alerts over the past few years....more

Dorsey & Whitney LLP

Cybersecurity: Key Considerations Developed by OCIE

Dorsey & Whitney LLP on

The SEC’s Office of Compliance Inspections and Examinations published a series of observations gleaned from thousands of exams over a period of years. While OCIE’s charge is the inspection of certain SEC registrants the...more

WilmerHale

NIST Releases Privacy Framework

WilmerHale on

On January 16, the Commerce Department’s National Institute of Standards and Technology (NIST) released version 1.0 of its Privacy Framework: A Tool for Privacy Through Enterprise Risk Management. The product of a two-year...more

McDermott Will & Emery

CCPA and ‘Reasonable Security’: A Game Changer

McDermott Will & Emery on

On January 1, 2020, the California Consumer Privacy Act of 2018 (CCPA) went into effect. The CCPA applies to a wide range of companies and broadly governs the collection, use and sale of personal information of California...more

71 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide