News & Analysis as of

Data Retention Cybersecurity

HaystackID

Safeguarding the Corporate Network Against Breaches through Information Governance

HaystackID on

While corporate leaders often view cybersecurity as a technical challenge, contributing author Phil Favro illustrates the legal and organizational dimensions of cybersecurity in this recent article. Favro emphasizes that...more

Paul Hastings LLP

You’ve Got Mail: NYDFS Enforcement Action Highlights Cybersecurity Risk of Over-Retention and Other Risks

Paul Hastings LLP on

On Aug. 14, 2025, the New York Department of Financial Services (NYDFS) issued a Consent Decree announcing that Healthplex, Inc. (Healthplex) has agreed to pay a $2 million fine, as a result of an investigation into a 2021...more

Hanzo

Your IP Is Everywhere: How to Protect and Collect Sensitive Content Across Collaboration Tools

Hanzo on

When a key engineer leaves for a competitor, they can take more than just experience, they may walk away with years of intellectual property hidden in code reviews, issue tickets, and chat threads. As ideas now flow across...more

Mayer Brown

Reducing Legal Risks From Ransomware Attacks: Lessons from Scattered Spider

Mayer Brown on

Leading businesses continue to suffer cyber attacks at the hands of sophisticated ransomware groups. For example, the threat group “Scattered Spider” (also known as UNC3944, Octo Tempest, 0ktapus) is once again making...more

Hanzo

Multiple Slack Workspaces, One Governance Strategy: Here’s How to Get It Right

Hanzo on

Managing collaboration at enterprise scale is inherently complex, especially when your organization operates across multiple workspaces. As teams become more distributed, compliance demands intensify, and business units push...more

Fisher Phillips

New SEC Cybersecurity Compliance Deadlines are Coming: What 5 Things Should Covered Institutions Do to Prepare?

Fisher Phillips on

The SEC’s amended Regulation S-P, adopted last year, will soon enhance data privacy protections for broker-dealers, investment companies, registered investment advisors, and transfer agents. The updated rule requires these...more

BakerHostetler

Data Governance: Practical Considerations for a Reasonable Security Program

BakerHostetler on

Imagine receiving an email from an unknown actor claiming to have taken approximately 2 terabytes of data from your organization’s network. The threat actor provides a file tree and sample files to substantiate its claim....more

Lighthouse

A Less is More Strategy for Data Risk Mitigation

Lighthouse on

With new collaboration features, AI tools, and work technology developing at a dizzying pace, we know that the volume of data organizations must manage will only increase faster. What are the risks and costs involved with...more

Dinsmore & Shohl LLP

Data Minimization: A Legally Required Tool to Mitigate Risk

Dinsmore & Shohl LLP on

The current landscape of data privacy and security is becoming exponentially more complex, with businesses facing both a growing list of cybersecurity risks and compliance requirements. Data minimization, an evolving...more

Faegre Drinker Biddle & Reath LLP

Permission to Record: Considerations for AI Meeting Assistants

A “low rumple,” followed by a “metallic ‘squink,’” a “mysterious ‘glonk,’” and someone yelling “Dear God!” After over-thinking an ill-timed throat-clearing by a board member of the Susan Ross Foundation, a paranoid and...more

Fox Rothschild LLP

Hawaii Issues Guidance to State Agencies on AI

Fox Rothschild LLP on

Hawaii’s State Data Office recently issued a series of guidance documents for its state agencies on how to handle artificial intelligence. This includes guidance on data protection, data retention and use of Generative AI....more

Mitratech Holdings, Inc

The Ethics of AI in Recruiting: Bias, Privacy, and the Future of Hiring

If you’re in recruiting, you know that AI is thrown around a lot. AI in recruiting is no longer a concept to keep an eye on for the future. It’s here, reshaping how businesses find talent and build hiring processes....more

Benesch

Staying Ahead of the Curve: Adapting to Evolving Cyber Regulatory Enforcement

Benesch on

As calls for executive accountability for cybersecurity intensify, it is essential for companies to scrutinize the adequacy of ephemeral messengers, such as Signal, WhatsApp, WeChat, and Snapchat, in light of both present and...more

Ius Laboris

New guidelines for retention of emails

Ius Laboris on

The Italian Data Protection Authority has adopted an updated version of a guideline document on email retention that it originally issued in December 2023, but which had been suspended....more

Butler Snow LLP

A New Look at an Old Hot Topic: The Internet of Things

Butler Snow LLP on

In 1999, computer scientist Kevin Ashton coined the term “the Internet of Things” (“IoT”) in order to put a name to his idea of using RFID chips to track items as they moved throughout a supply chain. “Though there is no...more

HaystackID

[Webcast Transcript] Solve the Digital Puzzle: Your Guide to Navigating Mobile Forensics’ Future

HaystackID on

Editor’s Note: In this insightful discussion between John Wilson, Chief Information Security Officer and President of Forensics at HaystackID, and Rene Novoa, Director of Forensics at HaystackID, we delve into the intricate...more

Jenner & Block

Client Alert: CISA Announces Proposed Cyber Incident Reporting Rule

Jenner & Block on

On March 27, 2024, the Cybersecurity and Infrastructure Security Agency (CISA), an operational component of the Department of Homeland Security (DHS), posted for public inspection its long-anticipated notice of proposed...more

WilmerHale

FTC Enters Consent Agreement With Blackbaud Following Major Data Breach

WilmerHale on

On February 1, the Federal Trade Commission (FTC or “the Commission”) announced that it had reached a settlement with Blackbaud, a software company, resolving claims related to a 2020 data breach that resulted in the...more

Lerman Senter PLLC

FTC Proposes Updates to COPPA Rule

Lerman Senter PLLC on

The FTC is proposing significant changes to the Children’s Online Privacy Protection Act (COPPA) rule to place new restrictions on the use and disclosure of children’s personal information. The COPPA Rule requires websites...more

Troutman Pepper Locke

New Amendments to NY DFS Cybersecurity Regulation: Big Changes for Big Companies, ‎and Other Implications

Troutman Pepper Locke on

Effective November 1, 2023, the New York Department of Financial Services issued its second amended Cybersecurity Regulation (the “Regulation,” 23 NYCRR Part 500). The amendment follows extensive public comments, some of...more

Troutman Pepper Locke

The NYDFS Updates Its Stringent Cybersecurity Regulations. Is This a Bellwether of Coming Industry Change? - The Consumer Finance...

Troutman Pepper Locke on

Join Troutman Pepper Partner Chris Willis as he discusses the New York Department of Financial Services’ (NYDFS) latest updates to its cybersecurity regulations with Troutman Pepper Privacy + Cyber Partner Kim Phan. With data...more

Jackson Lewis P.C.

Increase in In-House Oversight of Privacy

Jackson Lewis P.C. on

The Association of Corporate Counsel and Major, Lindsey & Africa recently released their 2023 Law Department Management Benchmarking Report (Report) which tracks key trends in law department financial and operational data....more

Bradley Arant Boult Cummings LLP

Complying With the FTC's Amended Safeguards Rule

Cybersecurity is a looming threat for most businesses. The impact of a major cyber event can resonate for weeks, months, and even years after the initial attack. To mitigate the risks to consumers, there have been several...more

HaystackID

[Webcast Transcript] Targeted Remote Collections for iOS and Android Devices: Challenges and Considerations for Sourcing Tools and...

HaystackID on

Editor’s Note: In this insightful transcript of the educational webcast hosted by HaystackID on May 17, 2023, our expert panel discusses targeted remote collections for iOS and Android devices, focusing on the unique...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

85 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide