In today’s digital age, cybersecurity has become a paramount concern for executives navigating the complexities of their corporate ecosystems. With resources often limited and the ever-present threat of cyberattacks,...more
AI has great capability to both harm and to protect in a cybersecurity context. As with the development of any new technology, the benefits provided through correct and successful use of AI are inevitably coupled with the...more
Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more
10/12/2023
/ Crisis Management ,
Cyber Attacks ,
Cyber Insurance ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Events ,
Incident Response Plans ,
Risk Mitigation
On July 26, 2023, the SEC adopted new rules to enhance and standardize disclosures pertaining to cybersecurity risk management, strategy, governance, and material cybersecurity incidents.
The SEC's decision to introduce...more
8/1/2023
/ Compliance ,
Corporate Governance ,
Cyber Incident Reporting ,
Cybersecurity ,
Disclosure Requirements ,
Form 8-K ,
New Rules ,
Regulation S-K ,
Reporting Requirements ,
Risk Management ,
Securities and Exchange Commission (SEC)
2023 is shaping up to be a landmark year for data privacy, as comprehensive consumer privacy laws take effect in four states and a fifth state expands its already robust privacy compliance requirements. As part of Womble Bond...more
In May 2017, the world of data privacy was irreparably changed when four members of the Chinese military hacked into credit-reporting company Equifax, exposing the personal information of nearly 150 million Americans. The...more
6/22/2022
/ California Consumer Privacy Act (CCPA) ,
Compliance ,
Compliance Dates ,
Consumer Privacy Rights ,
Corporate Counsel ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Popular ,
State Privacy Laws ,
Surveys
In the past 5 years businesses felt the increasingly intricate data management rules (GDPR, CCPA, BIPA) pressed against an explosion in hacking and ransomware. Companies experience pressure from legislators, regulators,...more
3/15/2022
/ Biometric Information ,
Continuing Legal Education ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Management ,
Data Privacy ,
Data Protection ,
Data Security ,
Data Use Policies ,
Geolocation ,
Hackers ,
New Legislation ,
Privacy Laws ,
Ransomware ,
State Privacy Laws ,
Webinars
This week I read a worried headline claiming that, in a recent consumer data breach, the hackers had managed to access consumers’ telephone numbers. This was treated as an important and troubling revelation....more
11/19/2021
/ ATDS ,
Bots ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Digital Wallets ,
Hackers ,
Mobile Apps ,
Multi-Factor Authentication ,
Online Banking ,
Phishing Scams ,
Phone Numbers ,
Popular ,
Spyware
In meetings with data security professionals, the same topic tends to arise: Why are we fighting the same security battles now that we fought 20 years ago?
The history of network and cyber security seems to be a...more
Top 3 Takeaways -
On Friday, June 4, 2021, the European Commission adopted two sets of standard contractual clauses, one for use between controllers and processors and one for the transfer of personal data to “third...more
We always suspected that the Amazon Echo resting quietly in your family room was more insidious than it seemed. Now we have confirmation. We know that the Echo can hear us. We also know that it records private conversations...more
6/23/2021
/ ALEXA ,
Amazon Echo ,
Amazon Marketplace ,
Connected Items ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Internet of Things ,
Oral Communications ,
Personal Assistants ,
Privacy Concerns ,
Security Systems ,
Wifi
If you want to keep tabs on criminals, build them a clubhouse. Provide them a comfortable place to relax and discuss their business, and you can learn about their contacts and activities. The strategy is not new....more
Last week this blog discussed the gap between what businesses can afford to spend on protecting their own data and what hostile governments can spend to attack them. We observed that the U.S. government is already helping to...more
The recent spate of apparently eastern European cyberattacks on important U.S. commercial interests—from SolarWinds to Colonial Pipeline—should force all of us to step back and review how we organize our world. Many crucial...more
Just when you thought it was safe to send your data across the water, the distinctive dorsal fin of Schrems II breaks the surface.
The EU, who can barely be convinced that the UK’s data privacy law is “adequate” despite...more
Stephanie Lambert, Chief Compliance Counsel with NetScout Systems, Inc., and Womble Bond Dickinson partner and veteran cyber attorney Ted Claypoole talk with host and business litigator, Mark Henriques, about the current...more
3/22/2021
/ Antitrust Provisions ,
Chief Compliance Officers ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data Storage ,
Information Governance ,
International Data Transfers ,
Privacy Laws ,
Schrems I & Schrems II ,
Standard Contractual Clauses ,
Technology Sector
Each new technology seems to offer creative tools for both criminals and law enforcement. Telegraphs and telephones spawned wire and phone fraud. The era of digital networking ushered in the age of hacking. Digital banking...more
I have written recently about the crashing tsunami of change in legal attitudes toward the largest U.S. data, technology and internet companies, especially in the antitrust realm. As we consider whether GAFA critic Tim Wu...more
The movement to localize some or all of internet data has grown over the past five years as countries introduce new laws restricting data flows, and others try to boost local businesses by placing burdens on international...more
2/23/2021
/ Algorithms ,
Authoritarian Regimes ,
Critical Infrastructure Sectors ,
Cybersecurity ,
Data Localization Law ,
EU-US Privacy Shield ,
Foreign Relations ,
General Data Protection Regulation (GDPR) ,
International Data Transfers ,
Personal Data ,
Popular ,
Privacy Concerns ,
Schrems I & Schrems II ,
Surveillance ,
Technology Sector
There is a reason we don’t all have a definitive digital identifier.
I am describing a digital ID to be used by everybody for everything we do online – any bank would know you anywhere and know what funds it could give...more
Last week I jumped from the starting point of the newest U.S. anti-trust action against Google into a discussion about the legal and economic status of data. I would like to carry the discussion of data further....more
Stung by Brexit and set adrift by a neglectful U.S. foreign policy, the European Union has started to explore new ways of breaking away from the rest of the world, including taking steps to cordon EU data into locally managed...more
12/4/2020
/ Cybersecurity ,
Data Collection ,
Data Localization Law ,
Data Privacy ,
E-Commerce ,
First Amendment ,
Foreign Policy ,
Free Speech ,
International Data Transfers ,
Internet ,
New Regulations ,
UK Brexit
How is a refrigerator like a stoplight camera and a delivery drone?
Each of these devices and hundreds of millions of others are part of the internet of things (IoT), meaning that manufacturers are building them with sensors...more
Definitions are important.
How we define words sets the context for how we regulate them. In the U.S., the definitions of legally defended private information are changing, affecting the entire scope of information...more
The Federal Trade Commission (“FTC”) conducted an investigation into Zoom Video Communications, Inc.’s (“Zoom”) privacy and security practices and announced a settlement agreement on November 9, 2020. As a part of the...more