News & Analysis as of

Security and Privacy Controls

Holland & Knight LLP

Safeguarding Health Information: Takeaways from HHS and NIST 2024 HIPAA Security Conference

Holland & Knight LLP on

President Ronald Reagan famously quipped, "I think you all know that I've always felt that the nine most terrifying words in the English language are: I'm from the Government, and I'm here to help."1 At an Oct. 23-24, 2024,...more

Fenwick & West LLP

The SEC is Cracking Down on Misleading Cybersecurity Disclosure

Fenwick & West LLP on

On October 22, 2024, the SEC charged two current reporting companies, Unisys Corp. and Check Point Software Technologies, and two former public companies, Mimecast Limited and Avaya Holdings Corp., with making materially...more

Lighthouse

Enhancing Compliance and Security Operations with AI

Lighthouse on

Summary: If you're tackling compliance and security challenges in an AI-driven world, this post is essential. Discover how Microsoft Purview and Copilot for Security streamline processes, enhance security, and boost...more

Guidepost Solutions LLC

AI Data Center Task Force-Integrating Security from the Start

In response to the rapid growth of AI technology, the White House has launched the AI Data Center Task Force, a strategic initiative aimed at advancing the development of data centers. These facilities are set to play a...more

BakerHostetler

(Cyber)Security Theater 101 - Georgia Tech, a Teachable Moment

BakerHostetler on

On August 22, 2024, the United States intervened in a whistleblower suit against the Georgia Institute of Technology, initially filed by current and former members of Georgia Tech’s cybersecurity team, alleging that Georgia...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

Supply Chain Attacks in the UK: Reducing Risk and Preparing for Upcoming Legal Changes

Effective information security is no longer just dependent on an organisation’s own internal cybersecurity controls. The UK Information Commissioner’s Office (ICO) highlights that third-party service providers are processing...more

Lathrop GPM

Is AI Putting Your Organization at Risk?

Lathrop GPM on

AI tools often drive efficiency and save money, but they have drawbacks. Here’s what to know....more

Epiq

Cyber Incidents on the Rise: Tips for Effective Data Breach Notification

Epiq on

Cyber incidents have been growing at an exponential rate in recent years. A recent report from the Identity Theft Resource Center found that there were over one billion data breach victims in Q2 of 2024, which is around five...more

WilmerHale

FTC’s Enforcement Action Against Avast Signals Increased Focus on Consumer Web Data

WilmerHale on

The Federal Trade Commission (FTC) has been actively flexing its authority as a privacy regulator in recent months. The agency has been especially focused on identifying data practices it views to be “unfair”, thereby...more

Womble Bond Dickinson

Data Dilemma: Navigating Data at the Crossroads of Innovation & Compliance

Womble Bond Dickinson on

Womble Bond Dickinson’s content series—Innovation Interchange: The Power of Cross-Industry Insight—explores emerging challenges from the viewpoint of trendsetting industries. ...more

BCLP

AI Surveillance and Data Privacy at the Games

BCLP on

As the Paris 2024 Summer Olympic and Paralympic Games (the “Games”) turn onto the final straight, the Games have yet again captured widespread global attention, on and off the track. With over 15.3 million visitors in Paris...more

Alston & Bird

Justice Department Intervention in Cyber False Claims Act Case Signals Escalation of Risk for Government Contractors

Alston & Bird on

An unprecedented cyber qui tam action involving Georgia Tech’s alleged failure to comply with certain cybersecurity controls underscores the importance of having advanced cyber requirements for federal contractors. Our...more

Bricker Graydon LLP

Scammers, SSNs, and Smelling Funny

Bricker Graydon LLP on

I was hanging out with my friend this weekend, both catching up on emails from a coffee shop. After a while, he turned to me. “Well sh*t. Looks like my social security number might be on the dark web.”...more

Holland & Knight LLP

DOJ Brings Suit Against University Under Its Civil Cyber-Fraud Initiative

Holland & Knight LLP on

Late last week, the U.S. Department of Justice (DOJ) filed its complaint-in-intervention in a qui tam lawsuit against the Georgia Institute of Technology (Georgia Tech), alleging that the university failed to meet certain...more

Nutter McClennen & Fish LLP

Are You Using AI to Process Consumer Information? Revisit Your Privacy Policy First!

What is a Privacy Policy? A company’s privacy policy details its commitments regarding the handling and use of consumer data. The policy must explicitly define the company’s practices for collecting, storing, processing, and...more

BakerHostetler

Looking in the Mirror: HHS OIG Audit Demonstrates HHS Agency’s Own Need for Focus on Cloud Security

BakerHostetler on

The OIG, the nation’s leader in fighting fraud, waste and abuse of Medicare, Medicaid and other HHS programs, periodically publishes reports on how federal healthcare programs could improve....more

Epiq

The Most Effective Ways to Prepare your Organization for a Cyber Incident

Epiq on

Cyber incidents have surged in recent years, with attacks more than doubling since 2020 and the number of victims totaling in the hundreds of millions in 2023 alone. These incidents can cost organizations millions or even...more

Sheppard Mullin Richter & Hampton LLP

Export Control Shake-Up: Navigating the Expanded Export Restrictions

On July 29, 2024, the U.S. Department of Commerce, Bureau of Industry and Security (BIS) proposed a series of transformative new rules aimed at tightening controls related to military, intelligence, and security activities...more

Wyrick Robbins Yates & Ponton LLP

Cookie Cutter: NY AG Announces Cookie Scrutiny with Business Guide to Website Privacy Controls

Website privacy controls—in the form of banners and pop-ups asking visitors to agree to, or reject, a website’s use of cookies, pixels, and similar technologies used to track their behavior—are becoming ubiquitous. In the...more

Hudson Cook, LLP

Mo Data, Mo Problems: Data Protection and Privacy Concerns for the Gaming Industry

Hudson Cook, LLP on

The Consumer Financial Protection Bureau's (CFPB) eyes are on the gaming industry and the potential harm consumers may suffer from data security and privacy concerns....more

Holland & Knight LLP

SEC Cyber Enforcement Update: Which Way Are the SolarWinds Blowing?

Holland & Knight LLP on

The SEC has been aggressively pursuing cybersecurity investigations and enforcement actions against public companies and foreign private issuers. In these actions, the SEC often alleges one of two theories: 1) that the...more

Goodwin

Texas’ New Privacy Law Goes Into Effect - And Attorney General Builds Enforcement Team

Goodwin on

Since the passing of the California Consumer Privacy Act (CCPA) in 2018, California has led the nation in privacy regulation and enforcement. But, beginning July 1, 2024, Texas will be the new sheriff in town....more

BakerHostetler

The SEC’s Regulation of Cybersecurity Continues

BakerHostetler on

The Securities and Exchange Commission entered into a resolution agreement with R.R. Donnelley & Sons (RRD) on June 18, 2024 with RRD agreeing to pay $2.125 million to resolve disclosure and control violations alleged by the...more

Womble Bond Dickinson

Frontier Communications Faces Multiple Class Action Lawsuits After Data Breach

Womble Bond Dickinson on

Frontier Communications (Frontier) faces three class action lawsuits in relation to a cyber data breach in which the criminal ransomware group, RansomHub, stole personally identifiable information (PII) of over 750,000...more

Venable LLP

The Subcontractor Performed. The Prime Contractor Paid. But a Hacker Ended Up with the Money. Who Is Responsible?

Venable LLP on

When hackers gain access to a subcontractor’s information systems and divert the prime contractor’s payment to themselves instead of to the subcontractor, does the prime contractor still have to pay the subcontractor?...more

340 Results
 / 
View per page
Page: of 14

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide