News & Analysis as of

General Data Protection Regulation (GDPR) Cybersecurity Information Technology

Follow this channel for updates and analysis on all aspects of the European Union's General Data Protection Regulation, a reform of EU's data protection rules that impacts... more +
Follow this channel for updates and analysis on all aspects of the European Union's General Data Protection Regulation, a reform of EU's data protection rules that impacts individuals throughout the Union and all businesses operating therein. less -
Mayer Brown

Changes to the UK GDPR Shelved (For Now)

Mayer Brown on

With the announcement of UK General Election for Thursday 4 July 2024, the Data Protection and Digital Information Bill has not completed the legislative process before the end of the current parliamentary session and will...more

Alston & Bird

What You Should Know About the EU Digital Operational Resilience Act

Alston & Bird on

The European Union’s (EU) new Digital Operational Resilience Act (DORA) will go into effect in January 2025. Our Privacy, Cyber & Data Strategy Team digs into DORA and discusses how the new law may impact businesses inside...more

Skadden, Arps, Slate, Meagher & Flom LLP

AI in Europe: Road Map for Navigating the IP, Data Protection and Regulatory Considerations

Organizations developing or using generative AI tools should implement cross-functional governance frameworks to develop and continuously monitor their use of such tools. From the earliest stages of generative AI use,...more

Dunlap Bennett & Ludwig PLLC

The Role Of A Cybersecurity Law Firm In Safeguarding Digital Assets

In today’s digital landscape, organizations face numerous cybersecurity threats that can compromise their valuable digital assets, including their data, IT infrastructure, networks, software, and intellectual property (IP)....more

Pillsbury Winthrop Shaw Pittman LLP

Upcoming EU Rules on Digital Operational Resilience

There will be additional compliance obligations and mandatory contractual provisions introduced for financial entities and outsourced IT service providers. The new DORA seeks to strengthen the resilience of financial...more

Osano

Establish Total Customer Trust with a Commitment to Data Privacy

Osano on

In the last few months alone, dozens of reported data breaches have already occurred.  From Twitter’s breach that leaked millions of user accounts to ChatGPT’s breach that exposed subscriber payment information, it can...more

Osano

GDPR Compliance in the U.S.: What to Know

Osano on

In 1992, Singapore banned the sale of all chewing gum. But if you owned a cornerstore in the U.S. and a Singaporean tourist came to visit your business, there would be nothing to stop you from selling them a pack of gum—in...more

Wilson Sonsini Goodrich & Rosati

European Commission Proposes New EU Cybersecurity Rules for Software and Hardware Products

On September 15, 2022, the European Commission (EC) published a Proposal for a Cyber Resilience Act (CRA Proposal) that sets out new rules in the European Union (EU) for software and hardware products and their remote data...more

Jenner & Block

US Tech Companies Under Increased Scrutiny from EU Data Protection Authorities

Jenner & Block on

By the close of 2021, EU data protection authorities (“DPA”) had initiated investigations into a number of US tech companies operating in Europe and further investigations are set to continue. In a recent case concerning...more

Jones Day

China Finalizes Data Security Law to Strengthen Regulation on Data Protection

Jones Day on

On June 10, 2021, the Standing Committee of the 13th National People's Congress passed the long awaited People's Republic of China (China) Data Security Law ("DSL") after a final read of the third draft. The DSL, which takes...more

Jackson Lewis P.C.

Data Protection And The Role Of Vendor Management

Jackson Lewis P.C. on

The SolarWinds hack highlights the critical need for organizations of all sizes to include cyber supply chain risk management as part of their information security program. It is also a reminder that privacy and security...more

Levenfeld Pearlstein, LLC

How to Address Cybersecurity Risks In A Private Placement Memorandum

The Securities and Exchange Commission (the “SEC”) requires companies to disclose the most significant factors that make investments in the company speculative or risky. Private Placement Memorandums (“PPMs”) are often used...more

Onna Technologies, Inc.

How to Maintain CCPA Compliance in the Cloud

As more organizations find themselves under scrutiny for the way they collect and use consumer data, maintaining CCPA compliance has never been more important. CCPA has been introduced to give control back to consumers,...more

Bricker Graydon LLP

Your data is under attack: Are you ready?

Bricker Graydon LLP on

On July 16, 2020, Blackbaud, a U.S. cloud software company and one of the world’s largest providers of financial and fundraising technology for nonprofit organizations and education institutions, notified its customers of a...more

Littler

Brazil’s Data Protection Law: HR’s Perspective

Littler on

With less than a year remaining before Brazil's General Data Protection Law (referred to as the LGPD) takes effect, HR professionals should start preparing. Originally Published in of SHRM - January 2020....more

McDermott Will & Emery

[Event] 2019 Cybersecurity & Privacy Risk Management Series - Insights on Cybersecurity and Data Privacy - May 7th, Chicago, IL

Information is one of your company’s most valuable assets. Now more than ever before, it is critical to remain vigilant to protect against today’s latest cybersecurity threats and to comply with increasingly expansive privacy...more

Hogan Lovells

Busting the Myth: Compliance with the ‘Gold Standard’ of the GDPR Does Not Buy You a ‘Free Pass’ Under China’s New Personal...

Hogan Lovells on

On December 29, 2017, the Standardization Administration of China, jointly with the PRC General Administration of Quality Supervision, Inspection and Quarantine, issued the Information Security Technology – Personal...more

Hogan Lovells

The UK Cyber Essentials Requirements for IT Infrastructure provides a window into GDPR expectations for data security requirements

Hogan Lovells on

The EU’s General Data Protection Regulation (GDPR), which went into effect in May 2018, requires companies to implement appropriate security measures when handling personal data....more

Esquire Deposition Solutions, LLC

Security perils continue to haunt law firms and clients

Law firms are investing more money in information security these days because their clients are effectively demanding it. More than 2 in 5 lawyers (41 percent) recently interviewed by Robert Half Legal were planning to...more

Ballard Spahr LLP

Ballard Spahr Interviews Two Leaders of the Colorado Information Security Community

Ballard Spahr LLP on

As part of the Rocky Mountain Information Security Conference hosted in Denver from May 8 to 10, 2018, Ballard Spahr Privacy and Data Security attorney David Stauss sat down with Robb Reck, Chief Information Security Officer...more

Hogan Lovells

10 steps to better cybersecurity -‘Intellectual Values seminar series #1’ video

Hogan Lovells on

Last month we hosted our annual ‘Intellectual Values’ seminar in London which this year focused on the ‘connected world’. Sarah Turner, an IP partner in our Tech Hub, gave a talk on the steps companies can take to improve...more

Littler

Amendment To Japan’s Omnibus Data Protection Law Mean New Compliance Requirements For U.S. Multinational Employers With Operations...

Littler on

Effective May 30, 2017, Japan amended its omnibus data protection law, the Personal Information Protection Act (“PIPA”), to add new compliance requirements that will have an immediate impact on many U.S. multinational...more

22 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide