In today's digital landscape, the exchange of personal information has become ubiquitous, often without consumers fully comprehending the extent of its implications. The recent actions undertaken by the Federal Trade...more
At the recent In-House Counsel Seminar, three Ward and Smith attorneys presented a realistic role play response to an incidence of wire fraud, addressing red flags associated with fraudulent communications, corporate incident...more
4/3/2024
/ Breach Notification Rule ,
Cyber Insurance ,
Cybersecurity ,
Data Breach ,
Documentation ,
FBI ,
Fraud ,
Hackers ,
Incident Response Plans ,
Malware ,
Phishing Scams ,
Wire Fraud
As the relentless march of technology continues, scams have evolved into cunning traps, presenting a challenge to individuals of all ages.
Among the great tapestry of age groups, despite the wealth of experience and...more
12/8/2023
/ Best Practices ,
Cybersecurity ,
Data Protection ,
Data Security ,
Enhanced Cybersecurity Services ,
Information Security ,
Internet ,
Mobile Devices ,
Passwords ,
Phishing Scams ,
Scams
Earlier this year, the North Carolina High School Athletic Association (NCHSAA) approved a proposal to adopt a policy allowing name, image, and likeness (NIL) deals for high school student-athletes....more
As the Artificial Intelligence (AI) hype continues, you may feel a sense of déjà vu.
But after attending the recent Corporate Legal Operations Consortium (CLOC) conference—which was dominated by sessions on ways that AI...more
The ongoing massive data breach in the world of advertising: real time bidding ("RTB").
You likely are, or have been, a target of RTB without your knowledge. The Irish Council for Civil Liberties ("ICCL") found that the...more
We live in an age where our digital footprint is forever preserved. Even before you think twice about it, your data has been collected and saved.
In fact, in 2020, it was estimated that nearly 2MB of data was generated...more
Data is king in today's digital economy. The estimated net worth of this global data market is forecast to hit nearly $235 billion by 2026, meaning collecting and sharing personal information is big business. ...more
A Ward and Smith attorney, Information Technology professional and Privacy Officer outlined a variety of best practices and tips for businesses dealing with data security and privacy issues.
The webinar, one in a series...more
Privacy and Data Security is the body of law that addresses how an organization can collect, handle, and use personally identifiable information and how that information needs to be protected.
Community Associations quite...more
A recent statistic posted by Sweor states that 75% of consumers admit to making judgments on a company’s credibility based on the company’s website design.
During COVID, many companies were forced to digitize their entire...more
Friday afternoon, news sources reported that Molson Coors Beverage Company notified the Securities and Exchange Commission about an ongoing data breach that had delayed and disrupted, "the Company's business, including its...more
Friday afternoon, reports surfaced that a foreign nation had compromised newly-discovered flaws in the Microsoft Exchange Server email software and breached the cybersecurity efforts of more than 60,000 known...more
The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the U.S. Department of Health and Human Services (HHS) are aware of an increased cybersecurity threat to hospitals...more
While much about COVID-19 and its long-term impact on businesses and the economy is unknown, its effect of a worldwide increase in a reliance on digital means to engage in business transactions is undeniable and unlikely to...more
On January 31, 2020, the United Kingdom (UK) withdrew from the European Union (EU).
From February 1, 2020, to December 31, 2020, the UK and EU are in a "Transition Period," where there will be no change to the process of...more
Restrictions are lifting, businesses are reopening, and corporate counsel face a slew of novel legal considerations as they guide their companies through post-lockdown operations.
During a May 14 webinar for the Research...more
Trademark clearance and registration—sounds like an additional legal expense, right?
Unfortunately, this potential cost is the reason many individuals and businesses forgo the trademark clearance and registration process...more
California has now enacted the strictest data privacy law in the nation.
The Consumer Right to Privacy Act of 2018 ("California Privacy Act"), which is set to go into effect on January 1, 2020, seeks to give consumers more...more
7/6/2018
/ Consumer Protection Laws ,
Cybersecurity ,
Data Collection ,
Data Rights ,
Governor Brown ,
New Legislation ,
Notice Requirements ,
Opt-Outs ,
Personally Identifiable Information ,
Portability ,
State and Local Government ,
State Data Breach Notification Statutes
In just a few short days, on May 25, 2018, supervisory authorities in the European Union ("EU") will begin enforcement of the EU's General Data Protection Regulation ("GDPR").
The GDPR is a regulation enacted by the EU to...more
5/17/2018
/ Breach Notification Rule ,
Cybersecurity ,
Data Processors ,
Data Protection ,
Data Protection Officers (DPOs) ,
EU ,
EU Data Protection Laws ,
EU-US Privacy Shield ,
Federal Trade Commission (FTC) ,
General Data Protection Regulation (GDPR) ,
International Data Transfers ,
Personal Data ,
Personally Identifiable Information ,
Vendor Contacts
The International Association of Privacy Professionals ("IAPP") is the world's largest information privacy organization.
IAPP provides education, training, and tools to professionals engaged in data privacy and security....more
4/27/2018
/ Artificial Intelligence ,
Blockchain ,
Cybersecurity ,
Data Processors ,
Data Protection ,
Data Protection Officers (DPOs) ,
EU ,
EU Data Protection Laws ,
EU-US Privacy Shield ,
General Data Protection Regulation (GDPR) ,
International Data Transfers ,
Personal Data ,
Right to Be Forgotten
The countdown has officially begun.
On May 25, 2018, the European Union's ("EU") General Data Protection Regulation ("GDPR"), a sweeping data privacy and security regulation resulting from years of regulatory and political...more
1/9/2018
/ Breach Notification Rule ,
Cybersecurity ,
Data Controller ,
Data Processors ,
Data Protection ,
Data Protection Officers (DPOs) ,
EU ,
EU Data Protection Laws ,
General Data Protection Regulation (GDPR) ,
International Data Transfers ,
Personal Data ,
Personally Identifiable Information
For many companies, the "hap-happiest season of all" coincides with the busiest season of all. Business owners and employees are racing to fill customer orders in time for the holidays, which also means an avalanche of new...more
12/22/2017
/ Cyber Attacks ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data Retention ,
Data Security ,
Encryption ,
Enforcement Actions ,
Federal Trade Commission (FTC) ,
Notice Requirements ,
Personally Identifiable Information ,
Popular ,
Privacy Policy
The national, and many times global, reach of most businesses, regardless of size and physical location, continues to drive the ever increasing importance and value of intangible assets. In fact, a business's intellectual...more
Any company that allows third-party users to post or link content to its website, mobile applications, or other online platforms must understand and comply with the new Digital Millennium Copyright Act ("DMCA") safe harbor...more