News & Analysis as of

Third-Party Service Provider Data Security

Mayer Brown

Navigating Facilities Management Outsourcing in a Post-COVID World

Mayer Brown on

The COVID-19 pandemic has significantly reshaped the facilities management (FM) outsourcing landscape. Companies have transitioned from fully office-based work to home-based work, and now to hybrid models, prompting a...more

Epstein Becker & Green

In the Cloud: A Safe Place for Your Personal Data?

Epstein Becker & Green on

As more organizations across industry sectors store personal data with cloud storage vendors— including the three largest vendors in the world, Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform—federal...more

Foster Swift Collins & Smith

DOL Echoes Employee Benefits and Cybersecurity Best Practices

On April 14, 2021, the U.S. Department of Labor’s (“DOL”) Employee Benefits Security Administration (“EBSA”) issued its first cybersecurity best practices guidance for retirement plans. The EBSA guidance was highly...more

BakerHostetler

Deeper Dive into the Data - May 2024

BakerHostetler on

Every spring, BakerHostetler collects, analyzes, and compares key metrics on the incident response matters we handled in the prior year. The output – our Data Security Incident Response (DSIR) Report – highlights key findings...more

Esquire Deposition Solutions, LLC

Actionable Advice When Sharing Client Data with Vendors

We’ve previously written on the need for law firms to scrutinize the data security protections in place at all third-party vendors who have access to client confidential information. Clearly, that’s still good advice....more

U.S. Legal Support

The Benefits of Medical Records Retrieval Outsourcing

U.S. Legal Support on

From cases involving car crashes to employee termination disputes, there are countless reasons for legal professionals to require access to a client’s medical, employment, financial, and other records. What’s more, these...more

Rothwell, Figg, Ernst & Manbeck, P.C.

The Pros And Cons Of Protecting AI As Trade Secrets

Trade secrets have become a de facto intellectual property right for securing valuable artificial intelligence information. Despite regulatory trends toward greater transparency of AI models, federal policy acknowledges,...more

WilmerHale

FTC Enters Consent Agreement With Blackbaud Following Major Data Breach

WilmerHale on

On February 1, the Federal Trade Commission (FTC or “the Commission”) announced that it had reached a settlement with Blackbaud, a software company, resolving claims related to a 2020 data breach that resulted in the...more

Hinshaw & Culbertson - Privacy, Cyber & AI...

Q&A: Four State Data Privacy Compliance Insights for 2024

With the first month of 2024 now behind us, it is time for organizations to start seriously considering key comprehensive state data privacy compliance obligations for 2024. In total, seven states passed data privacy laws...more

Parker Poe Adams & Bernstein LLP

The Increasing Importance of Cybersecurity Readiness in the Municipal Bond Market: How Public Institutions Can Respond

In today's evolving world of security and data privacy, K-12 schools, universities, local governments, and hospitals are increasingly finding themselves on the same list: vulnerable to the threat of a cyberattack....more

BCLP

Data and Cybersecurity - European Union Legislation and Proposals - December 2023

BCLP on

The pace of new EU law continues unabated, with IoT, cyber security and digital services being key areas of activity. The BCLP Data Privacy & Security team is tracking EU law developments relevant to data and cyber security....more

Pillsbury Winthrop Shaw Pittman LLP

Upcoming EU Rules on Digital Operational Resilience

There will be additional compliance obligations and mandatory contractual provisions introduced for financial entities and outsourced IT service providers. The new DORA seeks to strengthen the resilience of financial...more

Console and Associates, P.C.

Mount Desert Island Hospital Notifies 24,180 of Data Breach Involving Leaked Social Security Numbers

On June 30, 2023, Mount Desert Island Hospital (“MDIH”) filed a notice of data breach with the U.S. Department of Health and Human Services Office for Civil Rights after discovering that an unauthorized party had gained...more

Sheppard Mullin Richter & Hampton LLP

The Comprehensive Privacy Law Deluge: Updating Vendor Contracts

Of the many worries on privacy compliance teams’ lists as we face the onslaught of state “general” privacy laws are the impacts they have on vendor contracts. Fortunately for those who have already had to deal with contracts...more

Epiq

Deepfakes Bring Deep Risk

Epiq on

Most people know what a deepfake is but have not put much thought into how it could affect business operations. Deepfakes are videos, pictures, or audio that have been convincingly manipulated to misrepresent a person saying...more

Davis Wright Tremaine LLP

FTC Seeks to Clarify Health Breach Notification Rule's Broad Applicability to Unauthorized App Disclosures

The FTC released a Notice of Proposed Rulemaking (NPRM) to introduce changes to the Health Breach Notification Rule (HBNR). While the HBNR began as a breach notification rule seemingly focused on a narrow set of applications...more

McDermott Will & Emery

[Webinar] PCI DSS 4.0: Third-Party Service Providers and Risk Management - June 7th, 12:00 pm - 1:00 pm EDT

McDermott Will & Emery on

Join members of McDermott’s Global Privacy & Cybersecurity team and Alan Gutierrez-Arana of Mazars for the next installment in our PCI DSS 4.0 series. PCI DSS 4.0 brings major changes to payments with an increased focus on...more

Array

Five Questions to Ask Your eDiscovery Partner

Array on

Discovery is a critical element in any legal matter. In complex litigation and investigations, electronic discovery tends to cover a large portion of that process. As firms and in-house legal teams work to cover an increasing...more

Spilman Thomas & Battle, PLLC

Cybersecurity Rules and Colleges – Approaching Deadline

With only four months left before most changes to the federal Standards for Safeguarding Customer Information (“Safeguards Rule”) – a component of the Gramm-Leach Bliley Act (“GLBA”) that provides for the protection of...more

Benesch

Privacy Points 2023: New State Laws Introduce New Audit and Internal Review Requirements for Personal Information Collection and...

Benesch on

Some states will affirmatively require annual audits of a business’s data collection and processing practices and—in some cases—to submit those audits to state regulators. With new US state data protection laws taking...more

McDermott Will & Emery

[Webinar] PCI DSS 4.0: Timelines and Initial Preparation Steps Required for Your Business - February 1st, 12:00 pm - 1:00 pm EST

McDermott Will & Emery on

Last year, the Payment Card Industry Security Standards Council released version 4.0 of its Data Security Standard (PCI DSS 4.0). The new version, which brings major changes to the payments ecosystem and compliance...more

Rothwell, Figg, Ernst & Manbeck, P.C.

FTC Actions Hold Data Privacy Lessons For 2023

The Federal Trade Commission will have its eye on privacy and data security enforcement in 2023. In August, the agency announced that it is exploring ways to crack down on lax data security practices. In the announcement,...more

BCLP

Cyber laws will be updated to boost UK’s resilience against online attacks

BCLP on

The UK government confirmed on 30 November 2022 that there will be changes to the UK’s cybersecurity regulations in response to a public consultation launched earlier this year. This follows recent updates relating to the...more

Nextpoint, Inc.

Managing Ediscovery In The Cloud: Essential Questions to Ask Potential Providers

Nextpoint, Inc. on

As we explained in our last post, managing ediscovery in the cloud is the only viable solution for dealing with the massive amount of electronic data involved in litigation today. Nextpoint has been an advocate for...more

Ankura

What is MDR and How Does it Fit Into Your Security Strategy?

Ankura on

The global cyber threat landscape is rapidly evolving. The number of attacks, threat vectors, and endpoints continues to grow exponentially alongside the average time to detect and respond to a security incident. Today,...more

112 Results
 / 
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide