Latest Posts › Personally Identifiable Information

Share:

Is Your Business’s Privacy Policy a Bull's Eye?

We work with many US-based businesses that ask us to update their privacy policies to make sure they comply with current data protection laws that apply to them. These businesses are usually referring to their website privacy...more

Hacking the Hive: How It Can Help Businesses

Businesses can breathe a little easier now that one of the world’s top five ransomware networks, the Hive, has been infiltrated and disbanded by the FBI....more

Summary and Comparison of U.S. Data Privacy Laws Since California's CCPA and CPRA

California started the process of individual U.S. states enacting individual privacy laws with its California Consumer Privacy Act (“CCPA”), which currently is in effect, as supplemented and amended by the California Consumer...more

FTC Amendments Affecting Financial Institutions

As of January 10, 2022, the FTC’s amendments to the Safeguards Rule (“Amendments”) went into effect, 16 CFR Part 314; RIN 3084-AB35, Standards for Safeguarding Customer Information. The Amendments apply to financial...more

Virginia Enacts Second Privacy Law in the Nation

On March 2, 2021, Virginia’s Governor signed into law the Consumer Data Protection Act (“CDPA”). Virginia is the second state in the nation, after California, to enact a privacy law protecting the rights of individual...more

California’s Privacy Rights Act: Expanding and Clarifying the CCPA

WHAT MATTERS? Is your organization ready for California’s latest privacy rights law, enacted at the end of 2020 – the CPRA? This article addresses some key considerations to help you determine whether your organization may be...more

Updated CCPA Summary and Steps to Implementation

This article is intended to provide an outline summary of some of the key elements of the California Consumer Privacy Act (“CCPA”), including determining if your business is subject to CCPA and what are its primary...more

The Top Eight Things You Should Be Doing to Protect Your Business from Cyber Threats

Cyber threats take many forms. The wide-spread WannaCry ransomware attack in May of 2017 highlighted how computer files could be held hostage in return for payment, while the Dyn denial of service in October of 2016...more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide