News & Analysis as of

Data Breach Data Privacy Risk Management

Farella Braun + Martel LLP

Understanding the Importance of Data Asset Protection: Why Wineries Need to Pay Attention to Policies and Procedures

Data asset protection is traditionally associated with industries and entities that develop or store particularly sensitive information, like tech companies, hospitals, law firms, and government entities. However, data asset...more

BakerHostetler

[Event] Data Dilemmas: Avoiding the Road to Ruin - September 25th, Atlanta, GA

BakerHostetler on

Data is at the center of our digital economy and provides endless ways to interact and connect with customers. Maintaining more data means taking on more risk. Join us for an interactive program that begins in the middle of a...more

Lowenstein Sandler LLP

Salesforce Users: Organizations Using the Salesloft Drift AI Chat Agent with Salesforce Must Check Their Presence for Compromise

Lowenstein Sandler LLP on

Salesloft issued a security notification on August 26 regarding its Drift application. It appears to be a broad opportunistic attack on Salesloft/Drift instances integrated with Salesforce tenants. Salesloft issued updates...more

Downs Rachlin Martin PLLC

Protecting Your Team's Data: What Every Employer Needs to Know

Let’s talk about something that doesn’t get enough attention: protecting your employees’ sensitive personal information. In today’s digital world, keeping your team’s data safe isn’t just a nice-to-have—it’s absolutely...more

Smith Anderson

Brewing Trouble: The Steep Price of Privacy Missteps

Smith Anderson on

A recent high-profile breach at a women-focused dating app underscores how quickly a privacy misstep can escalate into lawsuits and reputational harm. The incident offers a cautionary tale for any company handling sensitive...more

Ankura

The 'Butler Attack' — Delivering Prompt Data Breaches Direct From Your Mailbox

Ankura on

Forget the “Barbarians at the gate,” we may have bigger issues to deal with from the “Butler’s serving us at our Banquets.” While Business Email Compromise (BEC) and/or ransomware attacks have been effective cyber-crimes to...more

Blake, Cassels & Graydon LLP

Responsabilité liée aux données dans les contrats relatifs aux technologies : aperçu des tendances récentes

L’attribution de la responsabilité dans les contrats relatifs aux technologies en cas d’atteintes à la protection des données est une préoccupation croissante pour les entreprises canadiennes. Récemment, Blakes a publié la...more

Constangy, Brooks, Smith & Prophete, LLP

Cybersecurity challenges in the health care industry: Legal, regulatory, and risk considerations

Health care remains one of the most targeted and vulnerable sectors when it comes to cyberattacks. In fact, a recent breach at a major health care analytics firm exposed the data of 5.4 million U.S. patients, making it one of...more

Jackson Lewis P.C.

We get Privacy for work – Episode 6: The Potential Privacy Risks Inherent to Mergers and Acquisitions

Jackson Lewis P.C. on

To say mergers and acquisitions present significant risk is an understatement; however, additional vulnerabilities are being exposed as bad actors threaten to exploit privacy and data security leaks during the transition. ...more

Blake, Cassels & Graydon LLP

Data Liability in Technology Contracts: Insights from Recent Trends

Allocating liability for data breaches in technology contracts is a growing concern for Canadian businesses. Blakes recently launched the first edition of the Canadian Data Liability Study, which identifies and analyzes...more

Bradley Arant Boult Cummings LLP

Defining Artificial Intelligence for Cyber and Data Privacy Insurance

A small but growing number of cyber insurers are incorporating language into their policies that specifically addresses risks from artificial intelligence (AI). The June 2025 issue of The Betterley Report’s Cyber/Privacy...more

Womble Bond Dickinson

The ICO’s Penalty Against 23andMe Brings New Emphasis on Cybersecurity Risks - Key Takeaways for U.S. Companies

Womble Bond Dickinson on

The dramatic increase in global reach that the internet provides U.S.-based companies comes as a double edge sword. While it significantly increases a company’s potential customer pool, it also subjects companies to...more

Alston & Bird

Data Breach Data Reviews: Challenges and What You Need to Know

Alston & Bird on

Our Privacy, Cyber & Data Strategy Team discusses how to overcome five challenges companies face in the wake of a data security incident when reviewing impacted data to comply with legal obligations....more

Jackson Lewis P.C.

Texas Enacts Liability Shield From Punitive Damages for Certain Small Businesses That Adopt Cybersecurity Programs

Jackson Lewis P.C. on

On June 20, 2025, Texas Governor Greg Abbott signed SB 2610 into law, joining a growing number of states that aim to incentivize sound cybersecurity practices through legislative safe harbors. Modeled on laws in states like...more

Robinson+Cole Data Privacy + Security Insider

Why Dumping Sensitive Data on Network Shares is a Liability

Are you storing sensitive data on a shared network drive? If so, your organization could be at serious risk of a data breach or privacy lawsuit. Shared drives, like the common “S:\ drive,” are often used to store documents,...more

K2 Integrity

[Webinar] Information Leaks: How to Respond, Investigate, and Protect Your Business - June 25th, 9:00 am ET

K2 Integrity on

Information leaks can range from exposures of internal decisions and salary data to the disclosure of intellectual property, strategy documents, or board minutes. Whether accidental or intentional, these leaks demand...more

BakerHostetler

Data Governance: Practical Considerations for a Reasonable Security Program

BakerHostetler on

Imagine receiving an email from an unknown actor claiming to have taken approximately 2 terabytes of data from your organization’s network. The threat actor provides a file tree and sample files to substantiate its claim....more

Bennett Jones LLP

Data Spring Cleaning: Minimize Your Liability

Bennett Jones LLP on

When we are retained by clients to guide them through a cyber-attack in which information has been stolen by a threat actor, we almost always find that the client has unnecessarily stored sensitive information far beyond the...more

Osano

A Guide to Data Privacy in Healthcare: Compliance and Best Practices

Osano on

Healthcare is a very personal experience. In order to receive the best care, individuals must share the most intimate details about themselves. For this reason, trust between patients and healthcare providers is crucial. Data...more

Ropes & Gray LLP

Adversarial Machine Learning in Focus: Novel Risks, Straightforward Legal Approaches

Ropes & Gray LLP on

The Artificial Intelligence and Machine Learning (“AI/ML”) risk environment is in flux. One reason is that regulators are shifting from AI safety to AI innovation approaches, as a recent DataPhiles post examined. Another is...more

Baker Botts L.L.P.

Florida Bar Passes Pioneering Cybersecurity Recommendation

Baker Botts L.L.P. on

On March 28, 2025, the Florida Bar unanimously approved Recommendation 25-1, which was proposed by its Cybersecurity & Privacy Law Committee and encourages all Florida Bar members and their firms to adopt certain proactive...more

Robinson+Cole Data Privacy + Security Insider

PIH Health Settles HIPAA Violations for $600,000

PIH Health, a health care entity located in California, suffered a data breach in June 2019 when 45 employee email accounts were compromised in a targeted phishing campaign. The accounts contained the protected health...more

Benesch

Tracking Technology Trouble: Shah v. Capital One Deepens Legal Risk Under CCPA and CIPA

Benesch on

In Shah v. Capital One Financial Corporation, the Northern District of California handed down a ruling that may shape the trajectory of litigation involving tracking technologies, online privacy policies, and California’s...more

Blake, Cassels & Graydon LLP

Protection de la vie privée au Canada : Nouvel outil d’autoévaluation des risques d’atteinte à la vie privée

Le 26 mars 2025, le Commissariat à la protection de la vie privée du Canada (le « CPVP ») a déployé, à l’intention des organisations, un outil d’autoévaluation du risque réel de préjudice grave à la vie privée (l’« outil »)....more

Blake, Cassels & Graydon LLP

Privacy Commissioner of Canada Releases Privacy Breach Risk Assessment Tool

On March 26, 2025, the Office of the Privacy Commissioner of Canada (OPC) released a privacy breach real risk of significant harm assessment tool (Tool) for organizations....more

279 Results
 / 
View per page
Page: of 12

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide