News & Analysis as of

Data Security

Foley Hoag LLP - Security, Privacy and the...

DOJ’s “Bulk Sensitive Data Rule” is in Effect, and May Require Significant Compliance Obligations as Enforcement is Set to Begin

Pursuant to a newly effective U.S. Department of Justice (DOJ) regulation, the transfer and storage of certain sensitive U.S. government and personal data may be prohibited or restricted, depending on the intended recipient,...more

K2 Integrity

[Webinar] Information Leaks: How to Respond, Investigate, and Protect Your Business - June 25th, 9:00 am ET

K2 Integrity on

Information leaks can range from exposures of internal decisions and salary data to the disclosure of intellectual property, strategy documents, or board minutes. Whether accidental or intentional, these leaks demand...more

Jackson Lewis P.C.

Different Country, Same Challenges: Lessons from a Breach That Could Have Been Prevented

Jackson Lewis P.C. on

A recent breach involving Indian fintech company Kirana Pro serves as a reminder to organizations worldwide: even the most sophisticated cybersecurity technology cannot make up for poor administrative data security hygiene....more

Venable LLP

Connecticut Signals an Increased Focus on Biometric Data Compliance

Venable LLP on

In April, the Office of the Connecticut Attorney General (OAG) released an updated enforcement report under the Connecticut Data Privacy Act (CTDPA) to highlight privacy enforcement actions taken in 2024....more

Hudson Cook, LLP

[Webinar] The Data Edge: Developments that Matter to Your Data Compliance - June 24th, 2:00 pm - 2:30 pm ET

Hudson Cook, LLP on

Hudson Cook, LLP is proud to announce the launch of The Data Edge: Developments that Matter to Your Data Compliance, a new monthly webinar series designed to help privacy and compliance professionals stay informed and...more

Foley & Lardner LLP

HIPAA Compliance Risks with AI Scribes in Health Care: What Digital Health Leaders Need to Know

Foley & Lardner LLP on

AI scribes are quickly becoming the digital sidekick of modern health care. They promise to reduce clinician burnout, streamline documentation, and improve the patient experience. But as health care providers and digital...more

Schwabe, Williamson & Wyatt PC

Agencies Release Actionable Guidance on Play Ransomware

The United States Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) have issued an...more

Spilman Thomas & Battle, PLLC

The Health Record - Healthcare Law Insights, V 2, Issue 6, June 2025

Welcome to our sixth issue of 2025 of The Health Record -- our healthcare law insights e-newsletter. In this edition, we look at the impact of supply chain and tariff issues on the industry, the veto of Florida's...more

Jackson Lewis P.C.

Managing the Managers: Governance Risks and Considerations for Employee Monitoring Platforms

Jackson Lewis P.C. on

In today’s hybrid and remote work environment, organizations are increasingly turning to digital employee management platforms that promise productivity insights, compliance enforcement, and even behavioral analytics. These...more

Morrison & Foerster LLP

China’s New CBDT Regime: One Year On

China rolled out its “new,” streamlined cross-border data transfer (CBDT) regime on March 22, 2024, with the issuance by the Cyberspace Administration of China (CAC) of the Provisions on Facilitating and Regulating...more

Ankura

[Webinar] Live Masterclass: Practical Approaches to Preventing Access to American’s Sensitive Data under Executive Order 14117 -...

Ankura on

Join us for an exclusive CLE-eligible live masterclass with cybersecurity, data privacy, and international trade professionals from Baker McKenzie and Ankura, where they will share how to implement a successful Data Security...more

Morgan Lewis - Tech & Sourcing

NIST Releases Updated Incident Response Guidance Under Its Cybersecurity Framework

During the Biden administration, there was a push to prioritize and modernize cybersecurity responses, and the National Institute of Standards and Technology (NIST) agreed to work with the technology industry to develop a new...more

Orrick, Herrington & Sutcliffe LLP

Montana Expands Health Care Privacy Law to Include Mental Health Digital Services

The Montana Legislature recently passed an update to the state’s Uniform Health Care Information Act (the Act), which creates standards for privacy and security of health care information maintained by Montana health care...more

A&O Shearman

US, Australian, New Zealand and UK cybersecurity agencies publish guidance on best practices for securing data used to train and...

A&O Shearman on

On May 22 2025, the cybersecurity agencies from the US, UK, Australia, and New Zealand published a Cybersecurity Information Sheet (CIS) on ensuring that data used to train and use artificial intelligence (AI) and machine...more

Baker Donelson

DOJ Final Rule Casts Wider Net: Common Business Data May Now Trigger National Security Scrutiny

Baker Donelson on

If you thought your company's collection of email address, IP address, zip code, birth date, or cookie data was too mundane to catch the federal government's attention – think again. Effective April 8, 2025, a new DOJ final...more

Hogan Lovells

Using AI in International Arbitration: what parties and arbitrators need to think about

Hogan Lovells on

Artificial intelligence (AI) is transforming the legal world, from the use of AI-assisted document review to deployment of generative AI for research and submission drafting. Recognising the prevailing wind, many...more

King & Spalding

New Security Measures for Large Databases: When a DPA’s Directives Set Standards

King & Spalding on

In response to a record year of personal data breaches in 2024, affecting millions of individuals, the French data protection authority (CNIL) has published a set of security directives for operators of large databases. While...more

Robinson+Cole Data Privacy + Security Insider

Adidas and UChicago Sued Over Data Breaches Caused by Third-Party Vendors

What do a global sportswear giant and a prestigious medical center have in common? Apparently, a shared struggle defending data breach lawsuits for breaches of sensitive personal information caused by third-party vendors....more

Robinson+Cole Data Privacy + Security Insider

Google Releases June Security Bulletin for Android Devices to Fix Vulnerabilities

Google recently issued its June Android Security Bulletin that is designed to patch 34 vulnerabilities, all of which Google designates as high-severity defects. The most serious flaw the patch is designed to fix in the...more

PilieroMazza PLLC

Cybersecurity Compliance in the Crosshairs: Raytheon’s $8.4 Million FCA Settlement and What It Means for Defense Contractors

PilieroMazza PLLC on

Government contractors regularly handle sensitive federal data, and cybersecurity compliance is no longer optional—it’s mandatory. A recent settlement between the Department of Justice (DOJ) and defense contractor Raytheon...more

Accelerynt, Inc.

Making Cloud Risk Data Actionable in Sentinel: A Playbook for CSPM Integration

Accelerynt, Inc. on

The Posture Visibility Problem - CrowdStrike Cloud Security Posture Management (CSPM) provides critical visibility into misconfigurations—such as publicly accessible storage, unencrypted assets, and overly permissive...more

HaystackID

Click. Notify. Exfiltrate. Why the Most Damaging Threats Start in Your Inbox

HaystackID on

Editor’s Note: Email remains the most reliable and comprehensive source of evidence in digital investigations, often providing insights that other platforms cannot. As threats become more sophisticated and data volumes grow,...more

Hogan Lovells

Malaysia enacts data sharing rules for public sector

Hogan Lovells on

With the introduction of the Data Sharing Act 2025 (the “Act”), Malaysia has formalised the rules governing the sharing of data between its public sector agencies. Designed to foster greater collaboration and efficiency, the...more

Womble Bond Dickinson

Overseas employees and contractors pose increased risks of data breach

Womble Bond Dickinson on

As data breach litigation continues to increase, companies need to worry about a new point of vulnerability - overseas employees.  Many large companies outsource customer services to India and other low-cost providers to take...more

Ius Laboris

Implementing AI Guidelines in Hong Kong

Ius Laboris on

Hong Kong’s Privacy Commissioner for Personal Data (PCPD) recently published Guidelines for the Use of Generative AI by Employees. We look at the key points contained in the Guidelines below....more

8,712 Results
 / 
View per page
Page: of 349

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide