Latest Posts › Data Protection

Share:

Can Privacy Be Bought? How Scrutiny of Meta’s Subscription Model Has Wider Implications –PART II

In Part I, we discussed the European Commission’s (“Commission”) disapproval of Meta’s “pay or consent” subscription model. In Part II, we delve into the European Commission’s findings, prior findings by the European Data...more

Network Topology and Network Mapping: The NIST Cybersecurity Framework – Part 2

A previous installment discussed the centrality of network topology to an organization’s data security and outlined the legal framework and obligations incumbent upon many organizations in the U.S. The first installment can...more

Network Topology and Mapping: Cornerstones of Data Security – Part 1

Data security is a top concern for organizations in today’s digital landscape. It protects data from unauthorized access, use, modification, or disclosure, and requires implementing technical, administrative, and physical...more

Navigating Data Ownership in the AI Age, Part 2: Frameworks Governing Data Ownership

The proliferation of AI-derived and processed data in the era of big data is occurring against a complex backdrop of legal frameworks governing ownership of and responsibilities with regard to that data. In a previous...more

The Imperative of Cyber Preparedness: The Power of Tabletop Exercises

In an age where digital connectivity is rapidly advancing, cybersecurity has become an inescapable concern for organizations across industries. With cyber threats ranging from data breaches to ransomware attacks, it is...more

Tabletop Exercises as Risk Mitigation Tools

As cyber threats have evolved and expanded, cybersecurity has emerged as a threat to organizations across sectors, and there is more urgency than ever for companies to remain vigilant and prepared. Cybersecurity incidents can...more

Cybersecurity in the U.S. Construction Industry: Navigating Challenges and Strategies for a Secure Future – Part 3

The third and final installment of this three-part series discusses the construction industry’s evolving landscape and the challenges it faces in the realm of cybersecurity, revealing how a comprehensive, data-centric...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide