Companies should take steps now to prepare for the new rules and expectations.
The US government continues to expand regulatory requirements around notification and disclosure of major cyberattacks or incidents. ...more
Seventh Hearing on Competition and Consumer Protection considers ethical, practical, and legal dimensions of artificial intelligence and machine learning.
On November 13 and 14, the Federal Trade Commission (FTC) held the...more
11/21/2018
/ Algorithms ,
Anti-Competitive ,
Antitrust Violations ,
Artificial Intelligence ,
Consumer Protection Laws ,
Data Privacy ,
Data Protection ,
Data Security ,
Federal Trade Commission (FTC) ,
Legislative Agendas ,
Popular ,
Regulatory Agencies ,
Technology Sector
Sixth hearing on Competition and Consumer Protection in the 21st Century features disagreement over FTC’s enforcement priorities for consumer data.
The Federal Trade Commission (FTC) recently held the sixth hearing in its...more
The Brazilian Congress has been working on a bill relating to the protection of personal data for over eight years. The Senate approved the bill, known as the General Data Protection Act (GDPA), on 10 July 2018, and the bill...more
As of December 31, 2017, many United States government contractors face a new compliance requirement involving cybersecurity. This requirement will govern most new Department of Defense (DoD) contracts and, significantly,...more
12/26/2017
/ Bid Protests ,
Breach of Contract ,
Cybersecurity ,
Data Protection ,
Data Security ,
Department of Defense (DOD) ,
DFARS ,
False Claims Act (FCA) ,
Federal Contractors ,
NIST ,
Popular
HHS OCR issues checklist, iterative guidance in wake of WannaCry and Petya attacks; Anthem breach settlement provides additional lessons.
Key Points:
..Healthcare organizations are particularly vulnerable to ransomware...more
7/11/2017
/ Business Associates ,
Covered Entities ,
Cyber Attacks ,
Cyber Incident Reporting ,
Data Breach ,
Department of Health and Human Services (HHS) ,
Guidance Update ,
Health Care Providers ,
Incident Response Plans ,
OCR ,
Popular ,
Ransomware ,
Risk Management ,
Security and Privacy Controls
1. Start Early -
Buyers should begin conducting cybersecurity risk assessments early in the engagement process. The target should be able to identify which information technology systems and data sets are key to the...more
In the wake of reported security breaches at a number of significant financial institutions, cybersecurity is garnering more attention and concern than ever before — both within the financial services industry and among...more
2/27/2015
/ Banks ,
Corporate Counsel ,
Critical Infrastructure Sectors ,
Cybersecurity ,
Data Protection ,
Financial Institutions ,
Internet ,
NIST ,
OCIE ,
Popular ,
Securities and Exchange Commission (SEC) ,
SIFMA
“It is often said that there are two kinds of companies out there — those that have suffered a data breach and those that will have one,” said Latham & Watkins partner Kevin Boyle. “So it makes a lot of sense to be prepared...more
A Stored Communications Act (SCA) search warrant case arising out of a New York federal narcotics trafficking investigation is being closely watched by EU data protection authorities, privacy advocates, multinational...more