News & Analysis as of

Data Privacy Software Data Security

Robinson+Cole Data Privacy + Security Insider

Department of Commerce Takes Lead in Addressing Risks from Connected Car Technology

As a Rhode Islander, I am a big fan of our former Governor and now Secretary of Commerce, Gina Raimondo. She has always had her eye on the ball of the rapidly developing data privacy and cybersecurity risks and threats to...more

Mitratech Holdings, Inc

Immigration Case Management Software: Your Complete Guide

Juggling paperwork and navigating complex immigration case management and regulations difficult and, at times, can cause unnecessary risk. For any immigration law firm, technology can make all the difference in streamlining...more

Foley & Lardner LLP

Technology Trends in Manufacturing and Associated Legal Risk Management: Driving Technological Advancement with an Ecosystem View 

Foley & Lardner LLP on

The importance of building technology-driven manufacturing businesses with an ecosystem focus—i.e., a comprehensive view of the complex network of suppliers, partners, and customers in a market—emerged as a critical theme for...more

HaystackID

Microsoft Delays Recall Rollout Amid Privacy Concerns

HaystackID on

Thursday, Microsoft announced its new line of Copilot Plus PCs would launch next week without the anticipated Recall feature. Originally part of Microsoft’s Copilot Plus suite, Recall was designed to take and store...more

Ward and Smith, P.A.

FTC: Three Enforcement Actions and a Ruling

Ward and Smith, P.A. on

In today's digital landscape, the exchange of personal information has become ubiquitous, often without consumers fully comprehending the extent of its implications. The recent actions undertaken by the Federal Trade...more

Mitratech Holdings, Inc

Caution! Credential Stuffing on the Rise

If you have a tendency to reuse the same password across multiple accounts, you could be leaving yourself (and your organization) exposed to risk. Credential stuffing, the stealthy technique fueling a recent explosion of...more

Furia Rubel Communications, Inc.

Embracing Data Privacy to Drive Business Growth with Aihong Yu, Chief Privacy Counsel of CDK Global

In this episode of On Record PR, Gina Rubel goes on record with Aihong Yu, Chief Privacy Counsel of CDK Global, to discuss how embracing privacy and security measures…...more

Nossaman LLP

Critical Infrastructure Organizations Warned to Upgrade Systems and Software

Nossaman LLP on

In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more

Health Care Compliance Association (HCCA)

Privacy Briefs: October 2023

Report on Patient Privacy 23, no. 10 (October, 2023) Kaiser Foundation Health Plan Inc. and Kaiser Foundation Hospitals will pay California $49 million to resolve allegations that they unlawfully disposed of hazardous waste,...more

CloudNine

6 Tips for Managing eDiscovery for Access Requests for a State or Local Government Organization

CloudNine on

By Catherine Ostheimer Being responsive to the growing number of Access Requests and DSARS as a local government organization can be daunting. First, there’s the data management challenge. State and local groups generate...more

Foley & Lardner LLP

NIST’s AI Risk Management Framework Helps Businesses Address AI Risk

Foley & Lardner LLP on

As we previously discussed, earlier this year the National Institute of Standards and Technology (NIST) launched the Trustworthy and Responsible AI Resource Center. Included in the AI Resource Center is NIST’s AI Risk...more

Reveal

Information Governance 101: Everything You Need to Know To Get Started in 2023

Reveal on

Information governance (IG) plays an increasingly significant role of the way corporations do business. But what do organizations do with all their data? Where do they store it—and is it secure, well organized, and...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

PilieroMazza PLLC

GSA Technology Contractors: 4 Requirements to Ensure Only Approved Software Is Used

PilieroMazza PLLC on

Almost two years ago, Executive Order 14028 – Improving the Nation’s Cybersecurity (EO) was issued requiring a host of actions be taken by the Federal Acquisition Regulation (FAR) Council, the National Institute of Standards...more

Sheppard Mullin Richter & Hampton LLP

Do Business With the Federal Government? Here’s a 2022 Cybersecurity Recap: Part Three - Secure Software Development Attestation...

Yesterday we continued our series... with the Office of Management and Budget’s September 2022 memorandum requiring federal agencies to only use software from software producers that attest compliance with secure software...more

Perkins Coie

Four Data Security Safeguards the FTC Would Like Companies To Adopt in 2023

Perkins Coie on

Data security will undoubtedly remain an enforcement priority for the Federal Trade Commission in 2023. A presentation on the FTC’s approach to data security by Deputy Chief Technologist Alex Gaynor at a Commission open...more

Nextpoint, Inc.

Managing Ediscovery In The Cloud: Essential Questions to Ask Potential Providers

Nextpoint, Inc. on

As we explained in our last post, managing ediscovery in the cloud is the only viable solution for dealing with the massive amount of electronic data involved in litigation today. Nextpoint has been an advocate for...more

Wiley Rein LLP

FTC’s PrivacyCon Highlights Risks and Opportunities For Children’s Privacy

Wiley Rein LLP on

This post is the second of our series reviewing the Federal Trade Commission's (FTC) seventh annual “PrivacyCon." In yesterday’s overview, we summarized the discussions focused on consumer privacy and data security in areas...more

Faegre Drinker Biddle & Reath LLP

Cybersecurity Safeguard Implemented by Superior Court of New Jersey for OUS Web Traffic

Last year, we explored the Federal Judiciary’s new safeguards and procedures to protect sensitive court records in light of the SolarWinds Orion cybersecurity breach. Now, as a result of increased hostilities between Russia...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - July 2021 #2

Robinson & Cole LLP on

CYBERSECURITY - Microsoft Issues Emergency Software Update for PrintNightmare Zero Day Vulnerability - Following the release of a U.S. Cybersecurity & Infrastructure Security Agency (US-CERT) Coordination Center...more

BCLP

FAQ: What is Session Replay Software and why is it under attack?

BCLP on

Session Replay Software is a type of software typically utilized by businesses with consumer-facing websites. These businesses are typically very interested in making their website more interactive and responsive to consumer...more

Faegre Drinker Biddle & Reath LLP

Buyer Beware: The Internet of Things Comes Under New Cyber Attack from Multiple Fronts

It is estimated that by the end of 2020, there will be more than 50,000,000,000 (yes, billion) connected devices that are part of the Internet of Things (IoT). This is a five million percent increase in IoT devices over the...more

Epiq

Using Microsoft 365 to Stay Compliant with Data Privacy Laws

Epiq on

Data privacy laws are popping up everywhere. Two years after the EU implemented the General Data Protection Regulation (GDPR), providing individuals with significant control over their data and harsh penalties for...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #170 – Patch: Business + Personal

In this week’s New + Now piece, we discuss the importance of patching software vulnerabilities and being patient at work to allow your data security colleagues to patch those vulnerabilities, which are coming more frequently...more

Sheppard Mullin Richter & Hampton LLP

DealerBuilt Settles with New Jersey Over Data Breach

The New Jersey attorney general recently announced its settlement with software company LightYear Dealer Technologies, LLC- doing business as DealerBuilt- over a 2016 data breach. The company provides its clients, car...more

31 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide