Latest Posts › Data Privacy

Share:

The Log4j Vulnerability: What This Critical Vulnerability Means for Your Enterprise

As companies scramble to address the newly exploited, ubiquitous Log4j vulnerability, companies’ actions are now the potential source for government scrutiny. Our Privacy, Cyber & Data Security Team summarizes what the Log4j...more

FTC Releases Warning to Companies that Fail to Mitigate Log4j Vulnerability

Less than a month ago, a critical vulnerability was identified in the ubiquitous, open source Log4j tool prompting swift guidance from Cybersecurity and Infrastructure Security Agency (CISA) and other security practitioners. ...more

Fifth Circuit Decision Raises Cyber Enforcement Complications for the U.S. Department of Health and Human Services

As the Biden administration begins detailing its regulatory and enforcement priorities, it faces a new challenge on the health data privacy and security front. In University of Texas M.D. Anderson Cancer Center v. United...more

BREAKING: Location and Mobile Data in the Fight against COVID-19 – An Overview of U.S. and Global Efforts

Governments are increasingly seeking to leverage consumer geolocation and other mobile device data to assist with fighting the spread of COVID-19, as cases continue to mount globally. Location data can be of significant...more

COVID-19 and HIPAA: Privacy, Security, and Breach Response During a Global Pandemic

There’s more than a virus in the air – there’s malware and spyware too. Our Health Care and Cybersecurity Preparedness & Response Groups team up to list proactive steps HIPAA covered entities and business associates can take...more

5 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide