Encryption is one of several cornerstones of a robust information security program. Articles on quantum computing often include the compelling narrative that encryption is at risk, but as with any revolutionary technology,...more
Novel technologies that seek to improve quality of life or simplify complex processes offer great promise. For example, medical technologies that detect or cure disease or supply chain technologies that allow for real time...more
Privacy issues are inherent in almost all facets of a business — from operations, employment, and technology to customer service, contracts, legal and compliance — all with varying degrees of risk. Most companies mitigate...more
8/27/2024
/ Business Litigation ,
Cybersecurity ,
Data Privacy ,
Law Enforcement ,
Personal Information ,
Policies and Procedures ,
Popular ,
Privacy Laws ,
Privacy Policy ,
Stored Communications Act ,
Subpoenas ,
Uniform Commercial Code (UCC) ,
Verizon ,
Warrants
For many, responding to an incident feels chaotic — questions swirling, uncertainties piling up, and no clear direction. Even when prepared with a well-rehearsed incident response plan, a data security incident places a...more
As Cybersecurity Awareness Month comes to an end and the spooky season of Halloween is upon us, no one wants to live through a cybersecurity horror story. There are some simple precautions every business and household can...more
Machine learning (ML) models are a cornerstone of modern technology, allowing models to learn from and make predictions based on vast amounts of data. These models have become integral to various industries in an era of rapid...more
8/17/2023
/ Artificial Intelligence ,
California ,
California Consumer Privacy Act (CCPA) ,
California Privacy Rights Act (CPRA) ,
Cyber Attacks ,
Cybersecurity ,
Data Privacy ,
Machine Learning ,
Popular ,
Risk Factors ,
State Privacy Laws ,
Technology Sector
There is a great YouTube video that has been circulating the internet for half a decade that reimagines a heuristically programmed algorithmic computer “HAL-9000” as Amazon Alexa in an iconic scene from “2001: A Space...more
In an era where our lives are ever more intertwined with technology, the security of digital platforms is a matter of national concern. A recent large-scale cyberattack affecting several U.S. federal agencies and numerous...more
6/19/2023
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Cybersecurity Information Sharing Act (CISA) ,
Data Breach ,
Data Transfers ,
Digital Platforms ,
International Data Transfers ,
National Security ,
Popular ,
Ransomware ,
Software ,
Technology Sector
Cybersecurity is a looming threat for most businesses. The impact of a major cyber event can resonate for weeks, months, and even years after the initial attack. To mitigate the risks to consumers, there have been several...more
6/7/2023
/ Amended Rules ,
Compliance ,
Cybersecurity ,
Data Disposal Protocols ,
Data Retention ,
Encryption ,
Exemptions ,
Federal Trade Commission (FTC) ,
Financial Institutions ,
Gramm-Leach-Blilely Act ,
Incident Response Plans ,
Information Systems Security Program (ISSP) ,
Multi-Factor Authentication ,
Popular ,
Risk Management ,
Safeguards Rule ,
Securities and Exchange Commission (SEC) ,
Small Business ,
Training Requirements
Cyber risks are increasing, and as a result, due diligence inquiries and valuations are increasingly focusing on the cybersecurity and privacy risks inherent in a business’s collection, use, retention and disposal of...more
7/14/2022
/ Acquisitions ,
Board of Directors ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Security ,
Due Diligence ,
Information Technology ,
Investors ,
Mergers ,
Risk Factors ,
Risk Management ,
Technology Sector
Thank you so much for joining us in this interview series! Before we dig in, our readers would like to get to know you. Can you tell us a bit about how you grew up?
I grew up in a small town of about 3,500 in rural North...more
4/18/2022
/ Business Entities ,
Compliance ,
Corporate Governance ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Security ,
Incident Response Plans ,
Internet of Things ,
Popular ,
Technology Sector
At last count, at least 39 states have introduced (or passed) comprehensive privacy legislation. After what was previously a watch-and-wait game of legislative whack-a-mole, we are now seeing this legislation get passed and...more
As part of Bradley’s continuing coverage of the North Carolina Sandbox Act, we wanted to know what community members and NC fintech aficionados thought about this proposed legislation. We posed six questions to Tariq Bokhari,...more
8/4/2021
/ Banking Sector ,
Blockchain ,
Cybersecurity ,
Data Privacy ,
Emerging Technology Companies ,
Financial Institutions ,
Financial Services Industry ,
FinTech ,
Insurance Industry ,
NGOs ,
North Carolina ,
Popular ,
Proposed Legislation ,
Stakeholder Engagement ,
Startups ,
State and Local Government
Technology is evolving and advancing at a dizzying pace across the globe. Emerging technologies are reimagining everything from how we interact with each other to how we interact with businesses and institutions. Given the...more
7/20/2021
/ Cybersecurity ,
Financial Services Industry ,
FinTech ,
Innovation ,
North Carolina ,
Privacy Laws ,
Proposed Legislation ,
Proposed Regulation ,
Provisional Waiver Applications ,
Regulatory Oversight ,
State and Local Government ,
Technology Sector
Florida has joined the wave of states considering new comprehensive data privacy legislation. On February 15, 2021, Rep. Fiona McFarland introduced HB 969, modeled after the California Consumer Privacy Act (CCPA). The bill is...more
3/29/2021
/ California Consumer Privacy Act (CCPA) ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Security ,
Florida ,
Governor DeSantis ,
Local Ordinance ,
New Legislation ,
Personal Information ,
Privacy Laws ,
Regulatory Reform
If you are responsible for handling data subject requests made pursuant to the EU General Data Protection Regulation or verified consumer requests made pursuant to the California Consumer Privacy Act, chances are you have...more
Crisis has set the stage for fintech companies in 2021, creating both new opportunities and potentially unprecedented challenges to innovation. While the coronavirus pandemic continues to accelerate the digital transformation...more
3/23/2021
/ Banking Sector ,
CFTC ,
Compliance ,
Consumer Financial Protection Bureau (CFPB) ,
Coronavirus/COVID-19 ,
Cryptocurrency ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Financial Services Industry ,
FinCEN ,
FinTech ,
Joe Biden ,
Legislative Agendas ,
OCC ,
Privacy Laws ,
Regulatory Oversight ,
Rulemaking Process ,
Securities and Exchange Commission (SEC) ,
Technology
On January 22, 2021, Bleeping Computer reported about yet another data dump by the hacker group Shiny Hunters, this time for a clothing retailer. Shiny Hunters is known for exfiltrating large databases of customer...more
2/2/2021
/ Customer Information ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Databases ,
EU ,
General Data Protection Regulation (GDPR) ,
Hackers ,
Passwords ,
Personally Identifiable Information ,
Popular
Has it been a year already? Many businesses diligently made sure they did their best to hit the moving CCPA target as they welcomed 2020 and the effective date of the statute last year. A year ago, all we had were draft...more
1/14/2021
/ California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Online Platforms ,
Personal Data ,
Personally Identifiable Information ,
Privacy Laws ,
Proposed Legislation ,
Proposed Regulation ,
Regulatory Agenda ,
State and Local Government
As the coronavirus (COVID-19) spread around the world, most businesses were forced to close their doors temporarily and take steps towards working virtually. However, the U.S. construction industry, deemed “essential” by...more
6/24/2020
/ Confidential Information ,
Construction Industry ,
Contractors ,
Coronavirus/COVID-19 ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data Protection ,
Internet of Things ,
Policies and Procedures ,
Popular
It’s 8 a.m., and you just learned that a material cyber-incident occurred in your organization. You fire up your Incident Response Plan. You engage outside counsel, and outside counsel engages a forensic firm. Your company,...more
This is the second alert in a series of Bradley installments on privacy and cybersecurity issues that may arise during the current COVID-19 pandemic. This installment focuses on IT issues that may impact businesses that are...more
This is the third alert in a series of Bradley installments on privacy and cybersecurity issues that may arise during the current COVID-19 pandemic. This installment focuses on privacy concerns related to schools and...more
The High-Stakes Compliance Risk You Probably Haven’t Heard Of -
While many businesses have been focused on CCPA compliance, there is another set of state privacy laws that may be flying under your organization’s radar. ...more
We are a little more than two weeks into the new year and we’ve already seen several states introduce comprehensive privacy legislation on the heels of California’s Consumer Privacy Act (CCPA). It is no easy task to stay on...more
1/21/2020
/ Consumer Privacy Rights ,
Corporate Counsel ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Security ,
Legislative Agendas ,
Opt-Outs ,
Personally Identifiable Information ,
Privacy Laws ,
Private Right of Action ,
Proposed Legislation