News & Analysis as of

Confidential Information Data Privacy Cybersecurity

Health Care Compliance Association (HCCA)

Privacy Briefs: August 2024

On July 19, Change Healthcare Ince. filed a breach report with HHS Office for Civil Rights (OCR) concerning its mammoth ransomware attack and breach. The organization’s breach report to OCR identifies just 500 individuals as...more

BakerHostetler

Reimagining Data in the Wave of AI

BakerHostetler on

Partner Janine Anthony Bowen explores data-related issues in technology contracts in the age of GenAI....more

Jackson Lewis P.C.

AI Notetakers – Evaluating the Risks Along with the Benefits

Jackson Lewis P.C. on

The explosion of generative AI has spawned a wide range of personal and professional tools and applications. One noteworthy (no pun intended) example of those tools and applications is notetakers that can capture, transcribe,...more

Bowditch & Dewey

How to Protect Your Company in the New World of AI

Bowditch & Dewey on

The new technology advancement using artificial intelligence (“AI”), ChatGPT (Chat Generative Pre-Trained Transformer) is a computer model that uses machine learning to generate relevant responses that mimic human-like...more

Health Care Compliance Association (HCCA)

Privacy Briefs: July 2023

A former hospital worker in Arizona was sentenced to 54 months in prison and ordered to pay restitution after pleading guilty to two felony counts involving identity theft and health information disclosure. In the plea deal,...more

Bass, Berry & Sims PLC

NIST Releases Public Draft of Revised Guidelines Aimed at Helping Contractors Protect Sensitive Information

Bass, Berry & Sims PLC on

On May 10, the National Institute of Standards and Technology (NIST) released its initial public draft of SP 800-171, Revision 3, a set of updated guidelines aimed at helping organizations better handle confidential...more

Shutts & Bowen LLP

EU-U.S. Data Privacy Framework Advances to the Next Stage

Shutts & Bowen LLP on

For companies that conduct business in both the European Union and the United States, data transfers between the EU and the U.S. has long been a challenging process, primarily in light of the EU’s strict privacy regulation,...more

Ankura

Implementing the Sedona Conference on Information Governance: Principles 4-6

Ankura on

The Sedona Conference is a widely known institute that is focused on the study of law and policy in many areas including Information Governance (IG). The Sedona Conference Commentary on Information Governance provides 11 IG...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, Volume 3, Issue 6

Massachusetts-Based Background Check Company Creative Services Faces Multiple Lawsuits Over Data Breach - "'CSI determined that certain files dating from November 2018 to November 2021 may have been copied from their...more

McDermott Will & Emery

[Webinar] That's All Folks! Have Federal Courts Killed Privilege Protections for Forensic Reports? - January 20th, 12:00 pm - 1:00...

McDermott Will & Emery on

Privacy Litigation Webinar Series Part 1 - Our Global Privacy & Cybersecurity team will be hosting a monthly webinar series on key issues and developments in privacy litigation. Confidentiality is a fundamental...more

Butler Snow LLP

What Lawyers Need to Know About Cybersecurity | Dennis Van Metre | Texas Appellate Law Podcast

Butler Snow LLP on

As technology becomes more sophisticated, so too do the security issues its users encounter. These challenges impact attorneys and law firms particularly, as they regularly deal with confidential data and privileged...more

Farella Braun + Martel LLP

[Webinar] Cyber Insurance for the Cannabis Industry - June 1st, 10:00 am - 11:00 am PT

Cannabis businesses have cyber security and privacy risks. While the risks are varied, many arise from the businesses’ holding of highly sensitive consumer information or confidential data about business partners. Cannabis...more

Fisher Phillips

7 Steps to Address Privacy Concerns Arising with the Remote “Invisible Workforce”

Fisher Phillips on

As remote work continues, employers have begun to characterize remote workers as the “invisible workforce” – because remote workers are not able to be seen or monitored in the same way as those performing in-person work. The...more

Pullman & Comley, LLC

ABA Ethics Committee Weighs in on Practicing Law Virtually

Pullman & Comley, LLC on

In  Formal Opinion 498, issued on March 10, 2021, the American Bar Association’s Standing Committee on Ethics and Professional Responsibility has provided some guidance on the ethical obligations triggered when a lawyer...more

Proskauer - Minding Your Business

Lessons from Wengui v. Clark Hill: Structuring a Two Track Cyber Investigation

As the D.C. District Court in Wengui v. Clark Hill recently commented, “[m]alicious cyberattacks have unfortunately become a routine part of our modern digital world. So have the lawsuits that follow them….” The court’s...more

Baker Donelson

Data Privacy Day: Top Considerations for 2021

Baker Donelson on

Happy Data Privacy Day! Since 2007, privacy professionals from across the globe have gathered together on January 28 to raise awareness about data privacy and security best practices and issues. ...more

Poyner Spruill LLP

Court Compels Discovery of Cyber Expert Report in Litigation

Poyner Spruill LLP on

A federal court has held that neither the work product nor attorney-client privilege doctrines shield a cyber expert’s report from discovery....more

Fisher Phillips

Not If But When: Cybercrime Targets Telework

Fisher Phillips on

As a result of the COVID-19 pandemic, millions of Americans have deserted the physical workplace. Modern technology and remote access capabilities have made it possible to transform almost any job to a telework position. As...more

Fenwick & West LLP

Top Work-at-Home Privacy and Security Challenges and Return-to-Work Safeguards in the COVID-19 Crisis

Fenwick & West LLP on

The results of recent Fenwick polling suggest that companies generally have insufficient remote-working security controls and data protection practices and are considering a variety of approaches to return-to-work safeguards....more

Bradley Arant Boult Cummings LLP

Struggle Creates Innovation: Technology and Data Privacy for Contractors

As the coronavirus (COVID-19) spread around the world, most businesses were forced to close their doors temporarily and take steps towards working virtually. However, the U.S. construction industry, deemed “essential” by...more

Esquire Deposition Solutions, LLC

Information Security Basics While Lawyering From Home

With offices shuttered and stay-home orders still in place across much of the country due to the COVID-19 pandemic, the task of providing legal services means working from home for nearly everyone, including attorneys and...more

Bass, Berry & Sims PLC

Privacy Perils: Trial Separation

Bass, Berry & Sims PLC on

For those with school age children, working from home now also means learning from home. In addition to your personal web surfing and emailing, separate your kids’ online school activities from a work-issued laptop and...more

Troutman Pepper

Digital Issues for Individuals Working at Home (Digital Planning Podcast)

Troutman Pepper on

The Digital Planning Podcast is designed to educate individuals about all things digital in connection with estate planning, business planning and estate administration. Your hosts, Jennifer Zegel, Ross Bruch and Justin...more

Goodwin

Practical Steps to Reduce Cybersecurity Risks During COVID-19

Goodwin on

Cybercriminals love a crisis and COVID-19 is no different. In the last several weeks, cyber-crime has increased exponentially as hackers seek to take advantage of the migration to a remote workplace. As cybercriminals seek to...more

Robinson+Cole Data Privacy + Security Insider

Frequency and Cost of Insider Threats Continue to Increase

The Ponemon Institute recently issued its 2020 Cost of insider Threats Global Report, which finds that the frequency and cost of insider threats is continued to increase. Sponsored by ObserveIT and IBM, the 2020 report is the...more

41 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide