The U.S. Securities and Exchange Commission (SEC) is becoming one of the federal agencies at the forefront of driving transparency, cybersecurity awareness and cyber incident reporting. As we reported in last year’s...more
2/27/2025
/ Cyber Incident Reporting ,
Cybersecurity ,
Data Security ,
Disclosure Requirements ,
Enforcement Actions ,
Form 8-K ,
Publicly-Traded Companies ,
Regulation S-K ,
Risk Management ,
Securities and Exchange Commission (SEC) ,
Securities Regulation
It is hard to believe that we are starting the 25th year of the 21st century. The rapid evolution that technology, privacy and data security have undergone these last 25 years is mindbending. Yet, as we enter 2025, it still...more
2/6/2025
/ Class Action ,
Class Certification ,
Consumer Privacy Rights ,
Consumer Protection Laws ,
Critical Infrastructure Sectors ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Personal Data ,
Privacy Laws ,
Privacy-By-Design ,
Regulatory Agenda ,
Technology ,
Technology Sector ,
Tracking Systems ,
VPPA ,
Web Tracking ,
Websites ,
Wiretapping
Introduction -
Recent years have brought a dramatic increase in the number of countries that have comprehensive privacy and data security laws. As the world has become increasingly digital, privacy and data protection have...more
2/24/2023
/ Brazil ,
Canada ,
China ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Protection Principles ,
Data Security ,
India ,
International Data Transfers ,
Personal Data ,
Personal Information Protection Law (PIPL) ,
PIPEDA ,
Popular
On December 9th, 2021, a critical zero-day vulnerability, which has the potential of providing threat actors access to millions of computers worldwide, was discovered. Due to the critical nature of this vulnerability, and the...more
12/17/2021
/ Cloud Computing ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Hackers ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Information Technology ,
Risk Management ,
Software ,
Vulnerability Assessments