News & Analysis as of

Data Security Data Storage Data Protection

Esquire Deposition Solutions, LLC

Actionable Advice When Sharing Client Data with Vendors

We’ve previously written on the need for law firms to scrutinize the data security protections in place at all third-party vendors who have access to client confidential information. Clearly, that’s still good advice....more

International Lawyers Network

Data Privacy Guide - Romania

Governing Data Protection Legislation - 2.1. Overview of principal legislation - The General Regulation Data Protection (Regulation (EU) 2016/679) (“GDPR”), as implemented by Law 190/2018 is the principal data...more

Womble Bond Dickinson

[Webinar] Innovation Interchange Summit: The Power Of Cross-Industry Insight - May 16th, 11:00 am - 4:00 pm ET

Womble Bond Dickinson on

Powerful ideas emerge when you look at something through a completely different lens. And when two parties come together to share those unique perspectives? That’s when the magic happens. Womble Bond Dickinson’s virtual...more

Dunlap Bennett & Ludwig PLLC

Understanding Remote Work Laws: A Comprehensive Overview

The COVID-19 pandemic accelerated our shift to remote work, which was already on the rise with the advent of new technology. Even before 2020, employees worked from nontraditional spaces, including coworking spaces and home...more

Dechert LLP

UK Data Regulator Joins Scrutiny of WorldCoin

Dechert LLP on

WorldCoin is a cryptocurrency project which uses iris scanning technology to issue a “World ID” as a digital identifier. Privacy concerns over WorldCoin have been voiced by several data protection authorities worldwide....more

McDermott Will & Emery

Special Report - Decoding Genomic Data Security: Lessons from FTC’s Vitagene Enforcement and the NIST CSF Profile for Genomic Data

McDermott Will & Emery on

Remarkable progress in DNA and RNA sequencing have democratized the generation and analysis of genomic data across diverse industry sectors, including biopharmaceutical research, healthcare, consumer ancestry, law...more

Reveal

Data Access Governance: Why It Matters and How to Implement It

Reveal on

Organizations collect and store data for all kinds of reasons, from understanding their customers and anticipating market changes to measuring their performance over time and making strategic business decisions. But as...more

Polsinelli

Florida Imposes a Ban on Offshoring Storage of Medical Information

Polsinelli on

On May 8, 2023, Governor DeSantis signed Bill CS/CS/SB 264 amending the Florida Electronic Health Records Exchange Act. Effective July 1, 2023, this new law will require that the offsite storage of certain personal medical...more

Sheppard Mullin Richter & Hampton LLP

[Webinar] Data Beware! Defending Class Actions in the Privacy and Data-Sharing Space - June 13th, 10:00 am - 10:30 am PT

This presentation will discuss the recent surge in class actions challenging companies’ practices for collecting, sharing, and storing consumer data, including claims arising under the Illinois Biometric Information Privacy...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

Conyers

Privacy and Data Breaches in the Cayman Islands

Conyers on

Since the introduction of the Data Protection Act (the “DPA”) in 2019, there has been a steady increase in the number of data protection breaches that have been reported to the Office of the Ombudsman. It is expected that...more

Lighthouse

As Employees Move, Keeping Data in All the Right Places Is Crucial

Lighthouse on

As the corporate workplace continues to evolve—encompassing hybrid work environments, bring your own device policies, and cloud-based storage—companies are well-advised to consider areas of increased vulnerability and whether...more

TransPerfect Legal

Changing the Automotive Narrative: Hacking Concerns & Wireless Communication Interfaces

TransPerfect Legal on

The automotive industry has been a tight-knit and exclusive club since the 1950s automobile boom. After months of distress caused by semiconductor chip shortages, assembly plant shutdowns, and higher prices, is that still the...more

Conyers

Understanding PIPA: Defining its Scope and Starting to Prepare

Conyers on

In a four-part series, Conyers will be diving into different topics relating to Bermuda’s privacy legislation, including: why we need privacy legislation and its purpose, how do we prepare for PIPA, the role and requirements...more

Jackson Lewis P.C.

The RIPTA Data Breach May Provide Valuable Lessons About Data Collection and Retention

Jackson Lewis P.C. on

Efforts to secure systems and data from a cyberattack often focus on measures such as multifactor authentication (MFA), endpoint monitoring solutions, antivirus protections, and role-based access management controls, and for...more

Morgan Lewis - Health Law Scan

Beware of Biometrics: Complying with Illinois’ Biometric Information Privacy Act

Biometrics are physical or behavioral human characteristics that can be used to digitally identify a person to grant access to systems, devices, or data. Examples of biometric identifiers are fingerprints, facial geometry...more

Fisher Phillips

NFTs Aren’t Just Revolutionizing Art, Sports, and Videogames – They’re Changing the Future of Employment

Fisher Phillips on

NFTs – or non-fungible tokens – are increasingly popular among artists, sports figures, and the video game industry. But NFTs (some selling for upwards of eight figures) are not just for gamers, Mark Cuban, and the ultra...more

Perkins Coie

China’s New Data Security Law Comes Into Force

Perkins Coie on

Only two months after the release of the second draft of the Data Security Law of the People’s Republic of China (the Second Draft), on June 10, 2021, the Standing Committee of the National People's Congress passed the new...more

Lighthouse

Making the Case for Information Governance and Why You Should Address it Now

Lighthouse on

You know that cleaning out the garage is a good idea. You would have more storage space and would even be able to put the car into the garage, which is better for security, for keeping it clean, and for ensuring an easy start...more

Fisher Phillips

3 Ways That Blockchain Can Help the Healthcare Industry Focus More on Patient Care and Less on Administrative Headaches

Fisher Phillips on

The healthcare industry has unique data management needs as it deals with patient information that is sensitive, personal, and confidential. However, this data is often stored and spread across different facilities and...more

K&L Gates LLP

China's New Data Security Law Bolsters Its Data Security Legal Regime

K&L Gates LLP on

On 10 June 2021, the Standing Committee of the National People’s Congress of China (NPCSC) approved the enactment of Data Security Law (the DSL) of the People’s Republic of China (PRC), which will take effect on 1 September...more

WilmerHale

China Tightens Control Over Overseas Securities Listings in Name of Data Security

WilmerHale on

On July 6, the General Office of the Central Committee of China’s Communist Party and the General Office of the State Council jointly issued the Opinions on Strictly Cracking Down on Illegal Securities-related Activity in...more

Reveal

[Webinar] Are Native Archiving and Data Protection Capabilities Enough for Modern Collaboration? - July 21st, 2:00 pm ET

Reveal on

As the use of Microsoft Teams has exploded, compliance officers, information governance professionals, and other risk management decision-makers must determine whether they have the right tools to secure the information that...more

Reveal

Why Data Minimization Can Help You Comply with Privacy Regulations

Reveal on

Data minimization is an operating principle that suggests an organization should only collect and utilize the minimum required data (MRD) to fulfill business operations. This principle of keeping only what we need is now...more

Reveal

You Need Only Two Letters Today to Keep Up with the “Alphabet Soup” of Compliance

Reveal on

Back in November, I wrote on this blog about Big Data being one of the challenges that is forcing technology to move more to the data sooner in the discovery process. One of the most notable fun facts that illustrate just how...more

44 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide