News & Analysis as of

Data Management Data Protection

Robinson+Cole Data Privacy + Security Insider

Mastering Information Governance with the ARMA IGIM 2.1 Framework – Part 4: Sustaining and Evolving IG Practices

Finally, after providing the building blocks for strong Information Governance (IG) programs and operationalizing that framework, we discuss how to sustain your IG program in the last part of the series. An effective IG...more

Phelps Dunbar

How Can Companies Guard Against Rising Nation-State Cyber Threats?

Phelps Dunbar on

The messages from government agencies and cybersecurity leaders at the end of June were clear – nation-state-sponsored cybersecurity threats are on the rise. Pro-Iranian “hacktivists” are targeting U.S. infrastructure and...more

Orrick, Herrington & Sutcliffe LLP

A Framework for Growth: Privacy/Security by Design

Thora Johnson shares simple guidance on: Data management for privacy compliance Ensuring data security through storage and retention practices...more

J.S. Held

Navigating Cloud Forensics in Complex Investigations

J.S. Held on

Introduction: Understanding Cloud Data in the Modern Digital Landscape - In today’s hyper-connected digital world, we interact with vast amounts of data, much of which isn’t stored locally on our devices but instead...more

Seyfarth Shaw LLP

The UK’s New Amendments to the UK GDPR Become Law and Get a Nod from the EU. What happens now?

Seyfarth Shaw LLP on

The UK’s Data (Use and Access) Act received Royal Assent last Thursday, June 19th, bringing into law some significant changes to the country’s post Brexit data protection framework, among an array of other, related rules (on...more

K2 Integrity

[Webinar] Information Leaks: How to Respond, Investigate, and Protect Your Business - June 25th, 9:00 am ET

K2 Integrity on

Information leaks can range from exposures of internal decisions and salary data to the disclosure of intellectual property, strategy documents, or board minutes. Whether accidental or intentional, these leaks demand...more

Dacheng

China Monthly Data Protection Update: May 2025

Dacheng on

This monthly report outlines key developments in China’s data protection sector for May. The following events merit special attention...more

Morgan Lewis - Tech & Sourcing

The Latest Trends in Moving ERP Systems to the Cloud

According to Forbes, “in 2025, the landscape of enterprise resource planning (ERP) is set for a thrilling transformation,” with a shift toward cloud-native ERP solutions at the top of the list....more

Dacheng

China’s First Judicial Decision on Cross-Border Personal Information Transfers: Clarification on Data Localization Requirement

Dacheng on

In August 2024, China Judgements Online published a ruling issued by the Guangzhou Internet Court on September 8, 2023, in a case widely regarded as China’s first judicial decision addressing cross-border personal information...more

Potomac Law Group, PLLC

Border Search Inspection of Electronic Devices: What Organizations and Their Employees Need to Know

Employees traveling internationally on behalf of an organization must take steps to protect sensitive, confidential, or proprietary data carried on electronic devices. U.S. Customs and Border Protection (CBP) has broad...more

HaystackID

Legal Data Intelligence Celebrates First Anniversary with Expanded Framework and New Use Cases

HaystackID on

The Legal Data Intelligence (LDI) initiative has reached a significant milestone as it marks its first year of operation. Since its May 2024 launch, it has demonstrated remarkable growth and evolution. What began as an...more

Lighthouse

Steering the Microsoft Copilot Fleet: What Every Enterprise Needs to Know

Lighthouse on

The possibilities in the Microsoft Copilot universe continue to expand. Discover the latest Copilot features and related risks you should know about along with guidance on how to better manage them....more

Osano

How to Shift Data Privacy Left

Osano on

The 1:10:100 rule—coined in 1992 by George Labovitz and Yu Sang Chang, the rule describes how much bad data costs. Preventing the creation of bad data at its source costs $1. Remediating bad data costs $10. Doing nothing...more

Thomas Fox - Compliance Evangelist

FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins

Welcome to the award-winning FCPA Compliance Report, the longest-running podcast on compliance. In this episode, Tom welcomes Andrew Hopkins, President of PrivacyChain, to discuss the critical intersection of AI, data...more

Ropes & Gray LLP

The Data Act: Six Months to Go — But What To Do?

Ropes & Gray LLP on

Our clients are at the forefront of many of the developments covered by the report. That said, I couldn’t help thinking that the report overlooked a law that takes effect in less than six months’ time and which will have...more

Constangy, Brooks, Smith & Prophete, LLP

What personal data are you unknowingly hoarding?

With the number of data breaches increasing each year, it’s becoming more important to know what personal data you have and where you have it. On personal or even work devices, you may be surprised at how much of your data is...more

Lighthouse

A Less is More Strategy for Data Risk Mitigation

Lighthouse on

With new collaboration features, AI tools, and work technology developing at a dizzying pace, we know that the volume of data organizations must manage will only increase faster. What are the risks and costs involved with...more

Mitratech Holdings, Inc

IT/DR Plan Spring Cleaning: How to Replace Outdated Policies

Ready to ditch outdated guidelines and adopt a fresh take on your IT Disaster Recovery plans? Spring is the season of renewal, making it the perfect time to refresh not only physical spaces but also strategies and...more

Clark Hill PLC

Right To Know - March 2025, Vol. 27

Clark Hill PLC on

Cyber, Privacy, and Technology Report - Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed....more

Lighthouse

Strategic Insights for Safeguarding Information with Microsoft Purview

Lighthouse on

Successful Microsoft Purview deployments require more than just technical implementation—they demand strategic planning, cross-functional collaboration, and ongoing optimization. Read about the key steps required to...more

IR Global

Data Protection in the Digital Age

IR Global on

With data becoming one of the most valuable assets, protecting it is not just a legal obligation but a business imperative....more

HaystackID

[Webcast Transcript] Data Minimization: Why Less is More

HaystackID on

Editor’s Note: Effective data management is more critical than ever, and the latest HaystackID® webcast, “Data Minimization: Why Less is More,” offered expert insights on why organizations must take a strategic approach to...more

A&O Shearman

European Commission clarifies key concepts of the Data Act in updated FAQs

A&O Shearman on

On February 3 2025, the European Commission published an updated version of the Frequently Asked Questions (FAQs) about the Regulation (EU) 2023/2854 on harmonised rules on fair access to and use of data (Data Act). Key...more

Osano

Privacy Governance: A Framework for Data Privacy Protection and Compliance

Osano on

Responsible organizations understand that privacy governance is essential for the systematic and compliant management of personal data and for maintaining customer and stakeholder trust. In a world where people increasingly...more

Hogan Lovells

Vietnam's new Law on Data

Hogan Lovells on

On 30 November 2024, the National Assembly of Vietnam passed the Law on Data ("Law on Data"), which will govern digital data-related activities, and come into effect on 1 July 2025. This new Law on Data, along with the...more

624 Results
 / 
View per page
Page: of 25

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide