Latest Posts › Cybersecurity

Share:

First CCPA Enforcement Action Shows Accepting User-Enabled Global Privacy Controls Is Mandatory

On Wednesday, August 24, 2022, the California Attorney General released a public statement addressing its first enforcement action under the California Consumer Privacy Act (“CCPA”) against Sephora. The Attorney General...more

New Utah Privacy Law Largely Overlaps with Existing State Statutes

The Utah Consumer Privacy Act (“UCPA”) passed by the Utah legislature was signed into law by Governor Spencer Cox on March 24, 2022 and becomes effective December 31, 2023. While companies conducting business in Utah will...more

California Privacy Rights Act: A Move Closer to GDPR? Part II

In Part II of this series, California-based Ali Baiardo, and London-based Alice O’Donovan, continue their comparison of the GDPR and California privacy law. ...more

California Privacy Rights Act: A Move Closer to GDPR? Part I

The recently-passed California Privacy Rights Act (CPRA) augments and supplements California’s existing privacy law, the California Consumer Privacy Act (CCPA). We are sure many practitioners are wondering how it stacks up...more

You’re CCPA Compliant. So Now What? Top Tips for Companies Looking Ahead to the Recently-Passed CPRA

The November 2020 election left a lot of questions. Among them, companies doing business in California are now asking about compliance with yet another California data privacy law, this time the California Privacy Rights and...more

Finally Final: CCPA Regulations Take Effect

On August 14, 2020, the California Attorney General announced final approval of the California Consumer Privacy Act Regulations by the Office of Administrative Law. The Regulations take effect immediately....more

AG Submits Final CCPA Regulations—Is Enforcement Still on Track for July 1, 2020?

On June 1, 2020, the California Attorney General submitted the final text of the CCPA Regulations to the California Office of Administrative Law (the “OAL”). This was the last step the AG needed to take before the...more

Update: Coronavirus Cyberscams and Other Attacks – Scammers Are Still at It

The global coronavirus pandemic continues on, and the cyberattacks and scams continue to multiply. In the midst of the pandemic, hackers are capitalizing on fears surrounding the outbreak by crafting COVID-19-themed attacks...more

Coronavirus Cyber Scams: Outbreak Map Used to Spread Malware and Cyber Attack Experienced by the HHS

In the midst of the coronavirus pandemic, hackers are capitalizing on fears surrounding the outbreak by crafting COVID-19-themed attacks aimed to infect computers with malware or obtain sensitive, personal information....more

California Attorney General’s Second Set of Modified CCPA Regulations: Undoing, Redoing, Clarifying

Here we go again. On March 11, 2020, the California Attorney General (AG) published a second set of modifications to its Regulations under the California Consumer Privacy Act. Unlike the AG’s modifications from just last...more

California Attorney General’s Modified CCPA Regulations: Top Ten Changes

On February 7, 2020, the California Attorney General (AG) published a set of Modified Regulations under the California Consumer Privacy Act (CCPA). The Modified Regulations take into account some of the comments received...more

CCPA Review: The CCPA May Prohibit Some, But Not All, State Consumer Protection Law Claims

In less than one month, the California Consumer Privacy Act of 2018 (CCPA) will go into effect and begin a new era of data breach litigation. While the California Attorney General is charged with generally enforcing the...more

California Attorney General’s Public Hearings on CCPA Regulations in Los Angeles and San Francisco—An Overview

This week, the California Attorney General held public hearings on the draft California Consumer Privacy Act (CCPA) regulations it issued in October. We attended the hearings in both Los Angeles and San Francisco. One clear...more

What is Your Family Office Doing to Protect Itself From Security Threats? (Part III)

Welcome back to our three-part series examining cyber vulnerabilities surrounding family offices and steps they can take to mitigate those risks. In Part One we discussed how family offices are particularly vulnerable to...more

What is Your Family Office Doing to Protect Itself From Security Threats? (Part II)

Welcome back to our three-part series examining vulnerabilities surrounding family offices and steps they can take to mitigate those risks. In Part One we discussed how family offices are particularly vulnerable to...more

What is Your Family Office Doing to Protect Itself From Security Threats?

At least 25% of family offices have been subjects of cyberattacks, and nearly 40% of them lack a cyber security policy. Welcome to a three-part series that will examine the cyber vulnerabilities surrounding family offices and...more

16 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide