News & Analysis as of

Data Breach Data Preservation

Fishman Haygood LLP

Ethical Rules for Using Generative AI in Your Practice

Fishman Haygood LLP on

At the risk of stating the obvious, we are still in the early days of what we believe to be an “AI Revolution” in the way that goods and services, including legal services, are and will be provided. That means that we do not,...more

HaystackID

New Cyber Regulations Define Battle Lines in Corporate and Infrastructure Security

HaystackID on

Amidst an ever-evolving cyber threat landscape, a recent slew of regulatory updates and cybersecurity standards are defining a new battlefront for securing critical infrastructure and corporate data across varying sectors....more

EDRM - Electronic Discovery Reference Model

[Webinar] How Legal Must Mitigate Risk in Today's Dangerous and Changing Data Landscape - May 23rd, 1:00 pm - 2:00 pm ET

One of the biggest challenges facing in-house legal teams is the ever-changing data landscape. The amount of structured and unstructured data has exploded over the last five years making legal and privacy activities more...more

Pagefreezer

The 2024 ESI Risk Management & Litigation Readiness Report

Pagefreezer on

New study finds legal departments struggling to manage electronically stored information (ESI), resulting in delays and fines. Review the key findings from the 2024 ESI Risk Management & Litigation Readiness Report....more

Mayer Brown

Proposed Rule Issued to Implement Cyber Incident Reporting for Critical Infrastructure Act

Mayer Brown on

On March 27, 2024, the Cybersecurity & Infrastructure Security Agency (CISA) within the US Department of Homeland Security released a much-anticipated notice of proposed rulemaking (NPRM) to implement the Cyber Incident...more

Morrison & Foerster LLP

Litigation Readiness: Seven Things to Keep in Mind

Morrison & Foerster LLP on

Data breach class actions continue to rise, following almost inevitably from nearly every major security incident. Here are seven things in-house counsel can do to prepare for that anticipated litigation....more

Ankura

First Doesn't Always Make the Winner - The Pitfalls of Self Remediation Post Cyber Incident

Ankura on

So, you just got the news every organization does not want to hear; you have become the victim of a cyber attack. While there are many different ways of approaching a cyber incident, the one thing that is consistent is...more

Hanzo

HIPAA Compliance & the Role of Enterprise Information Archiving

Hanzo on

Most people have heard of the Health Insurance Portability and Accountability Act (HIPAA), so it’s not surprising that companies dealing with digital health information will have to be HIPAA compliant. To do so, any protected...more

Mitratech Holdings, Inc

Data Governance And Data Management: What’s The Difference?

Mitratech Holdings, Inc on

A lot of attention is now being paid to the topic of data governance, and what it means versus data management. Within the last few years, data governance has leapt from an esoteric term bandied about only by IT...more

Sheppard Mullin Richter & Hampton LLP

SEC To Focus on Cybersecurity in 2019

For the fourth year running, the Securities and Exchange Commission’s Office continues to list cybersecurity as one of the top enforcement priorities for 2019. As it relates to cybersecurity, the SEC will be focusing on...more

BCLP

How Employers Can Become Experts at Data Breaches: Preserving the evidence of a breach

BCLP on

The immediate reaction of many organizations when they discover that a system may be infected with a virus or malware is to remove, erase, and rebuild the potentially infected system as quickly as possible in an effort to...more

11 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide