News & Analysis as of

Sensitive Business Information Data Protection

Fisher Phillips

Protecting Data While Traveling Internationally: An Employer’s Guide for Foreign Nationals and Other Global-Traveling Workers

Fisher Phillips on

International travel may pose serious data security risks – especially for your foreign national workers carrying sensitive, proprietary, or regulated information. Travelers must be aware of potential border inspections,...more

Osano

[Virtual Event] The Privacy Pro Survival Summit 2.0: This Time It’s Personal - April 10th, 10:30 am - 5:30 pm EST

Osano on

Privacy pros are passionate about doing good work, in every sense of the word. Yes, we care about managing privacy as thoroughly and efficiently as possible (and not getting fined). But we are all in this line of work for a...more

Fox Rothschild LLP

Preparing for a TikTok Ban: What Employers Should Do to Ensure Access to Crucial Information Before It Disappears

Fox Rothschild LLP on

In recent years, TikTok has become a widely used platform for communication and content sharing, boasting nearly 2 billion users globally and 170 million active users in the U.S. alone. And while other social media platforms...more

Jackson Lewis P.C.

Insider Threats: The Overlooked Risks of Departing Employees and Sensitive Data Theft

Jackson Lewis P.C. on

Insider threats continue to present a significant challenge for organizations of all sizes. One particularly concerning scenario involves employees who leave an organization and impermissibly take or download sensitive...more

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

Epstein Becker & Green

Preparing for the Cybersecurity and Fraud Risks of Deepfakes: What Executive Teams Need to Know

Epstein Becker & Green on

The widespread availability of Artificial Intelligence (AI) tools has enabled the growing use of “deepfakes,” whereby the human voice and likeness can be replicated seamlessly such that impersonations are impossible to detect...more

Epstein Becker & Green

Why Executive Teams Should Prepare for the Cybersecurity and Fraud Risks of Deepfakes

Epstein Becker & Green on

The widespread availability of Artificial Intelligence (AI) tools has enabled the growing use of “deepfakes,” whereby the human voice and likeness can be replicated seamlessly such that impersonations are impossible to detect...more

EDRM - Electronic Discovery Reference Model

What Everyone Gets Wrong About Inherent Risk, and Why it Really Matters

Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more

Sheppard Mullin Richter & Hampton LLP

The Land of 10,000 Lakes Adds New Consumer Privacy Law: Minnesota Joins Privacy Fray

Minnesota’s governor has now signed into law that state’s comprehensive privacy law. For those keeping count – that is number 19 of state “comprehensive” privacy laws, with six in 2024 alone. The Minnesota law will go into...more

Integreon

Best Practices for Reducing the Cost of a Cyber Incident for Small to Mid-Sized Businesses

Integreon on

Originally published in American Business Magazine - May 2024. Many small- and mid-sized business owners believe that they are not prime targets for a cyber breach and that threat actors only go after large companies. This...more

Mitratech Holdings, Inc

[Webinar] Data Security Secrets for HR: Background Screening, I-9, & Beyond - March 6th, 1:00 pm CST

Mitratech Holdings, Inc on

In this webinar, discover why data security is more than a checkbox and gain insights into the risks and best practices that can safeguard your organization. Join industry experts as they delve into the risks, laws and...more

Spilman Thomas & Battle, PLLC

Remote Work Strategies for Managing Cybersecurity Teams

Managing a remote cybersecurity team at colleges and universities involves addressing a unique set of challenges to ensure the security of sensitive data and infrastructure. There is an additional overlay of potential...more

Mitratech Holdings, Inc

HR Compliance & Remote Employee Engagement: Where the Two Meet (Part 2)

Mitratech Holdings, Inc on

Businesses know there are distinct challenges when balancing remote work, employee engagement, and HR compliance. Unfortunately, many cannot focus on all three things, and one, two, or even all three get lost. Not focusing on...more

Array

Cybersecurity and eDiscovery: What you need to know about your vendor

Array on

Baker McKenzie recently released their sixth annual edition of ‘The Year Ahead: Global Disputes Forecast’ in which senior legal and risk leaders share what they expect to see in the coming year. From an overarching...more

Fisher Phillips

6 Proactive Tips to Address Employee Defection Concerns Before a Crisis Unfolds

Fisher Phillips on

It is often said that the best defense is a good offense. That is certainly true if you are an employer conducting a risk assessment of potential employee defections that could expose your company to losses of valuable...more

Bass, Berry & Sims PLC

Privacy Peril: End of the Year Investment Planning

Over the years we have offered several recommendations to increase your protection against attacks and intrusions and harden your cybersecurity. In this final tip for 2022, we mention a novel, though somewhat radical,...more

Reveal

5 Ways to Protect Sensitive Information From Unauthorized Disclosure

Reveal on

Sensitive information is everywhere, from clients’ names and addresses to the trade secrets a business relies on to beat its competition. As such, organizations can’t avoid collecting, processing, storing, and transferring...more

PilieroMazza PLLC

Time Is Running Out: Federal Contractor Data at Risk of Public Disclosure Unless Objections Are Filed by Monday

PilieroMazza PLLC on

On August 19, 2022, the Department of Labor’s Office of Federal Contract Compliance Programs (OFCCP) published a public notice to contractors about a Freedom of Information Act (FOIA) request from the Center for Investigative...more

Goldberg Segalla

Death by a Thousand Paper Cuts: The Scourge That Is Business Email Compromise

Goldberg Segalla on

In June 2014, the CEO of Omaha-based Scoular Company sent a series of emails to his company’s controller to let him know that the company was in negotiations to buy a Chinese company. The emails highlighted the sensitivity of...more

Epiq

CyberSide Chats: Yes, you needed a cyber attorney a long time ago (with Erik Weinick)

Epiq on

Jerich Beason is joined by Erik Weinick. Erik's experience includes privacy, cybersecurity, bankruptcy, commercial torts, defamation/slander, regulatory to name a few. He is also the co-founder of Otterburg’s Privacy &...more

Epiq

[Virtual Event] Executive Roundtable Series in Canada: Digital Transformation after COVID-19: Compliance, Security and the Cloud -...

Epiq on

Please join Epiq and Microsoft Canada for an interactive roundtable discussion on the impact of digital transformation, compliance, data protection and Information Governance in Canada's Healthcare Sector. This 60-minute...more

Fisher Phillips

One Year Later: How the Evolving Work-from-Home Climate Prompts Reminders for Technology Best Practices

Fisher Phillips on

Perhaps no COVID-19 phenomenon will have a more lasting impact than the virtual office. Many employers recently marked the first anniversary of the decision to ask their employees to work from home in an effort to combat the...more

Epiq

[Virtual Event] Executive Roundtable Series in Canada: Digital Transformation after COVID-19: Compliance, Security and the Cloud -...

Epiq on

Participate in thoughtful discussions with Epiq and Microsoft Canada on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft Canada would like to personally invite you to join a...more

Hanzo

Continued Progress on Hanzo’s Innovate UK Grant: Identifying Data Leakage on Slack

Hanzo on

For the last several months, the Hanzo team has been building artificial intelligence models using grant funds that we received from Innovate UK’s Sustainable Innovation Fund. The grant was designed to help companies recover...more

Epiq

[Virtual Event] Executive Roundtable Series in Canada: Digital Transformation after COVID-19: Compliance, Security and the Cloud -...

Epiq on

Participate in thoughtful discussions with Epiq and Microsoft Canada on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft Canada would like to personally invite you to join a...more

52 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide