News & Analysis as of

Security Standards

Fox Rothschild LLP

Significant Changes Made to PA Public School Code

Fox Rothschild LLP on

A collection of new laws signed by Pennsylvania Gov. Josh Shapiro during this year’s budget process make important amendments to the Public School Code affecting all school entities. Among them is Act 55 of 2024, which...more

EDRM - Electronic Discovery Reference Model

Maryland Bar Association Promotes Increased Judicial Security

It was great to read MSBA Leads the Way in Advocating for Judicial and Attorney Security | Maryland State Bar Association (July 30, 2024), written by the MSBA President, Raphael J. Santini....more

Maison Law

Proving Negligent Security in California Personal Injury Claims

Maison Law on

Inadequate security measures may cause or contribute to crime in stores, apartments, offices, hotels, motels, and entertainment venues. Criminals might take advantage of...more

Faegre Drinker Biddle & Reath LLP

NIST Releases Cybersecurity Framework 2.0

On February 26, 2024, the National Institute of Standards and Technology (NIST) released the NIST Cybersecurity Framework 2.0 (CSF 2.0). CSF 2.0 represents the first major update to the Cybersecurity Framework, which was...more

Benesch

Airline Security Threat Environment and Regulatory Compliance

Benesch on

Government reporting contains no shortage of signals that threat actors, including traditional terroristic actors, are eager to disrupt global shipping and supply chains. This threat environment of frequent negative headlines...more

Stikeman Elliott LLP

OSFI Releases Finalized Integrity and Security Guideline

Stikeman Elliott LLP on

On January 31, 2024, OSFI released its finalized Integrity and Security Guideline (“Guideline”). The Guideline is a result of the extension of OSFI’s mandate, as of January 1, 2024, to include the oversight of integrity and...more

Robinson+Cole Data Privacy + Security Insider

Mozilla Releases Security Updates for Thunderbird and Firefox

Mozilla recently released security updates to address known vulnerabilities in their Thunderbird and Firefox products. The Cybersecurity & Infrastructure Security Agency (CISA) is recommending that the patches be applied...more

McCarter & English, LLP

President Biden’s Executive Order on AI: Bringing Law to the New Frontier

McCarter & English, LLP on

After considerable anticipation and speculation, President Biden recently issued an Executive Order (EO) on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence. While the EO focuses primarily on...more

Davis Wright Tremaine LLP

White House Ushers in New Era of Regulation With Landmark Executive Order on Artificial Intelligence

The AI executive order moves the U.S. closer to a broader unified approach on federal AI regulation, expanding on the AI Bill of Rights and NIST AI Risk Management Framework and focusing on the responsible development and...more

Jones Day

President Biden Issues Executive Order on "Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence"

Jones Day on

On October 30, 2023, President Biden signed a first-of-its-kind executive order entitled, "Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence" ("AI")....more

Proskauer - New Media & Technology

President Issues Sweeping Executive Order to Manage Risks of AI

On October 30, 2023, President Biden issued an “Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence” designed to spur new AI safety and security standards, encourage the development of privacy-preserving...more

Pillsbury Winthrop Shaw Pittman LLP

Administration Poised to Act on “Internet of Things” Devices

The FCC and House of Representatives have begun discussions on the safety and security of IoT modules from China. The FCC adopted a Notice of Proposed Rulemaking to create an Internet of Things (IoT) cybersecurity labeling...more

Polsinelli

Generative AI’s ‘Industry Standards’ for Cybersecurity and Data Privacy Could be Here Sooner Rather than Later

Polsinelli on

AI may be both the most “powerful capability of our time” and the “most powerful weapon of our time." That’s according to Jen Easterly, Director of the Cybersecurity and Infrastructure Security Agency, when interviewed...more

A&O Shearman

China brings into force Regulations on the Administration of Deep Synthesis of Internet Technology

A&O Shearman on

The People’s Republic of China’s Regulations on the Administration of Deep Synthesis of Internet Information Services (Regulations) entered into force on 10 January 2023, following their adoption by the Cyberspace...more

Polsinelli

Blockchain Developers Urge Congress – Be Bold About Data Privacy and Security

Polsinelli on

Crypto is dead or on life support, waiting for regulation to rid it of ‘crypto contagion.’  Meanwhile, blockchain technology – the virtual, public ledger technology that records crypto transactions – is very much alive, as...more

Polsinelli

For OT Cybersecurity, Extra Time is Running Out

Polsinelli on

Operational technology (OT) is hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes and events. By design, OT underpins many critical...more

Robinson+Cole Data Privacy + Security Insider

AUVSI and DOD’s Defense Innovation Unit Announce Collaboration for Cyber Standards for Drones

The Association for Uncrewed Vehicle Systems International (AUVSI), the world’s leading trade association for drones and other autonomous vehicles, announced a collaboration with the Department of Defense’s (DOD) Defense...more

CDF Labor Law LLP

Los Angeles Hotels Increase Worker Protections

CDF Labor Law LLP on

Consistent with the increased safety protections that we have seen put in place in the hotel industry for hotel workers throughout California over the past few years, the City of Los Angeles recently passed an Ordinance to...more

Guidepost Solutions LLC

Physical Security. Risk Mitigation. Where to Begin?

Why are you operating your physical security program? What threats are you trying to protect against? What specific risks to your organization and enterprise are you trying to mitigate? If you cannot quickly and...more

Guidepost Solutions LLC

7 Steps for a Safe Return to the Office

As the COVID-19 pandemic appears to be entering the endemic phase, organizations are turning their attention to onsite collaboration and physical interaction among staff members, many of whom have been working remotely for...more

Proskauer on Privacy

Department of Health and Human Services Issues Request for Information on Cybersecurity Standards

Proskauer on Privacy on

The Department of Health and Human Services (“HHS”) has issued a formal request for information from the public about how regulated entities are implementing industry recognized security practices. The request for information...more

Akerman LLP - Health Law Rx

Help Wanted: OCR Seeks Public Input on “Recognized Security Practices” and Sharing Settlements with Harmed Individuals Under the...

Covered entities and business associates subject to the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) have the chance to provide input on two amendments to the Health Information Technology for...more

Polsinelli

When the Feds Find Out! Lack of Data Security Leads to Novel and Hefty Settlements

Polsinelli on

The Federal Government continues ramping up enforcement of data security requirements by deploying significant new enforcement theories and tools in support of cyber and data security controls required by federal law....more

Wyrick Robbins Yates & Ponton LLP

A Prelude to Enforcement: Colorado AG Issues Remarks Opining on What Constitutes Reasonable Security Measures

Last month, on Data Privacy Day, Colorado’s Attorney General Philip Weiser released prepared remarks entitled “The Way Forward on Data Privacy and Data Security” that shed some light on his approach to enforcing Colorado’s...more

Robinson+Cole Data Privacy + Security Insider

Health Care IoT Devices Pose Risk to Patient Care

As if health care entities don’t have enough to worry about  during this chaotic and difficult time in the pandemic, a new report released by Cynerio, entitled “The State of IoMT Device Security 2022,” provides a list of...more

123 Results
 / 
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide