News & Analysis as of

Supply Chain Confidential Information

Health Care Compliance Association (HCCA)

Privacy Briefs: August 2024

On July 19, Change Healthcare Ince. filed a breach report with HHS Office for Civil Rights (OCR) concerning its mammoth ransomware attack and breach. The organization’s breach report to OCR identifies just 500 individuals as...more

Jackson Lewis P.C.

Dealing With the Growing Threat of Cyberattacks in Manufacturing Sector: What Employers Need to Know

Jackson Lewis P.C. on

For the second year in a row, the manufacturing industry has fallen victim to more cyberattacks than any other major business sector. Indeed, according to IBM Security’s X-Force Threat Intelligence Index, nearly 25 percent...more

Rothwell, Figg, Ernst & Manbeck, P.C.

Why Privacy And Trade Secret Law Are On A Collision Course

Can privacy law and trade secret law coexist, or is compliance with both impossible? We are experiencing the fourth industrial revolution, driven by the rise in data and connectivity, analytics and artificial intelligence....more

ArentFox Schiff

The Generative AI Revolution: Key Legal Considerations for the Consumer Products Industry

ArentFox Schiff on

For better or worse, generative Artificial Intelligence (AI) is already transforming the way we live and work. Within two months of its initial release to the public, ChatGPT reached 100 million monthly active users, making...more

Dunlap Bennett & Ludwig PLLC

Updating Government Contracting Documents for Cybersecurity

This article is the third and final installment in a series of articles about how lawyers can better serve their clients by involving themselves in cybersecurity planning at an early stage. Just like Return of the Jedi was...more

Lowenstein Sandler LLP

Effective and Efficient Pre-Transaction FCPA Diligence: How to Leverage Compliance and ESG to Avoid Buyer’s Remorse and Other...

Lowenstein Sandler LLP on

The arduous process of FCPA compliance requires risk teams to digest and cross-reference a morass of information – from internal data analysis to human representatives collecting interviews on the ground. Diligence failures...more

Sheppard Mullin Richter & Hampton LLP

NYDFS Issues Ransomware Guidance

The New York State Department of Financial Services recently announced new guidance addressing ransomware attacks, and highlighting cybersecurity measures to significantly reduce the risk of an attack. The guidance comes as...more

Akin Gump Strauss Hauer & Feld LLP

CMMC and the Three “Cs”: Cost, Conflicts and Competition

A. Introduction and Key Take-Aways - The Department of Defense’s (DOD) Cybersecurity Maturity Model Certification (CMMC) program provides a metric for independent third parties to use in assessing and certifying the...more

The Volkov Law Group

Bumble Bee CEO Convicted of Participating in Price-Fixing Conspiracy

The Volkov Law Group on

Global companies are paying greater attention to criminal antitrust risks – and with good reason.  We often dwell on the impact to a company of a major FCPA investigation.  A global criminal antitrust investigation often in...more

Franczek P.C.

Jawbone Cries Foul – Fitbit’s Success Due To Stolen Trade Secrets

Franczek P.C. on

Fitbit better watch its step because Jawbone has a serious bone to pick with its competitor. On May 27, 2015, Jawbone, a maker of wearable fitness and activity tracker devices, filed suit in California state court...more

Brooks Pierce

A Non-Insider Trading Case in the District of Massachusetts

Brooks Pierce on

Insider trading prosecutions can be difficult. Because of the haphazard and tortuous growth of insider trading law itself, the prosecutions involve proving lots of different pesky elements. Fiduciary duties, materiality,...more

11 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide