News & Analysis as of

Security and Privacy Controls Third-Party Service Provider Cybersecurity

Winstead PC

Top Data Privacy & Cybersecurity Considerations in 2025 for RIAs

Winstead PC on

Compliance and Regulations - Ensure adherence to SEC regulations with appropriate privacy and cybersecurity policies tailored to SEC requirements....more

Ogletree, Deakins, Nash, Smoak & Stewart,...

Supply Chain Attacks in the UK: Reducing Risk and Preparing for Upcoming Legal Changes

Effective information security is no longer just dependent on an organisation’s own internal cybersecurity controls. The UK Information Commissioner’s Office (ICO) highlights that third-party service providers are processing...more

Esquire Deposition Solutions, LLC

Actionable Advice When Sharing Client Data with Vendors

We’ve previously written on the need for law firms to scrutinize the data security protections in place at all third-party vendors who have access to client confidential information. Clearly, that’s still good advice....more

Faegre Drinker Biddle & Reath LLP

The SEC’s Most Detailed Cybersecurity Guidance to Date

The SEC, through its Office of Compliance Inspections and Examinations (“OCIE”), recently issued its most detailed cyber guidance to date. OCIE had previously issued several cybersecurity risk alerts over the past few years....more

Harris Beach Murtha PLLC

New York Board of Regents Approves Part 121 Regulations Required by Education Law § 2-d

January 14, 2020, the Board of Regents formally adopted Part 121 to the Commissioner’s Regulations to implement Education Law § 2-d. The regulation will become effective January 29, 2020. This regulation primarily addresses...more

White and Williams LLP

New York’s SHIELD Act Cheat Sheet

White and Williams LLP on

Effective October 23, 2019 for changes in data breach notification requirements, and March 21, 2020 for new data security requirements, New York’s “Stop Hacks and Improve Electronic Data Security Act” (SHIELD Act) broadens...more

NAVEX

[Webinar] Cyber Security and Insider Threats: Turning Policies into Practices - April 6th, 1:00pm EST

NAVEX on

Unfortunately even the best technological defenses won’t protect your company’s intellectual property and data if your employees inadvertently or intentionally take actions to compromise confidential information. The key to...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide