News & Analysis as of

Data Security

Alston & Bird

Microsoft Announces Two New On-Premises SharePoint Vulnerabilities

Alston & Bird on

Introduction - On July 19, 2025, Microsoft announced two new vulnerabilities that are actively being exploited (CVE-2025-49704 and CVE-2025-49706) and that relate to on-premises Microsoft SharePoint instances that are exposed...more

Lighthouse

Data Loss Prevention in the Age of AI: Deploying Microsoft Purview DLP

Lighthouse on

The second post in our data loss prevention series offers a roadmap for implementing Microsoft Purview DLP to secure sensitive data in AI-influenced environments. From discovery and classification to policy enforcement,...more

Fisher Phillips

New California Regs Will Impact Your AI and Privacy Policies: FAQs on Automated Decision-Making, Risk Assessments, and...

Fisher Phillips on

California regulators unanimously approved a sweeping set of regulations on July 24 governing the use of automated decision-making technology (ADMT) and mandating risk assessments and cybersecurity audits for businesses...more

Troutman Amin LLP

ATTENTION ATTENTION: Minnesota’s Data Privacy Act Is Now Law As Of Today- July 31, 2025!

Troutman Amin LLP on

Starting today, July 31, 2025, the Minnesota Consumer Data Privacy Act (“MCDPA”) officially takes effect. Signed by Governor Tim Walz in May 2024, this act majorly affects how the personal data of Minnesota residents is...more

American Conference Institute (ACI)

[Event] National Conference on AI Law, Ethics, Safety & Compliance - October 8th - 9th, Washington, DC

ACI’s National Conference on AI Law, Ethics, Safety & Compliance delivers a practical roadmap to implement and evolve your AI strategy while navigating its legal, ethical, and technical complexities. Gain actionable...more

Womble Bond Dickinson

The Cybersecurity and Infrastructure Security Agency (CISA) Agrees to Release Report detailing Telecom Infrastructure...

Womble Bond Dickinson on

The Cybersecurity and Infrastructure Security Agency (CISA) has agreed to make public a report from 2022 about US telecommunications networks' flawed security practices which relate to the Salt Typhoon attacks experienced by...more

Constangy, Brooks, Smith & Prophete, LLP

What the Sensitive Data Rule means for “bulk data” and National Security compliance

As of July 9, the U.S. Department of Justice has begun full enforcement of a sweeping new data regulation known as the Sensitive Data Rule, or “SDR.” Implemented under President Biden’s Executive Order 14117, the SDR marks a...more

Ropes & Gray LLP

U.S. Cybersecurity Sector Recap

Ropes & Gray LLP on

M&A activity in the cybersecurity sector is on pace to exceed 2024 volume by 10% in 2025, with continued consolidation as larger firms acquire niche players to enhance capabilities or expand product offerings. The...more

Hanzo

Your IP Is Everywhere: How to Protect and Collect Sensitive Content Across Collaboration Tools

Hanzo on

When a key engineer leaves for a competitor, they can take more than just experience, they may walk away with years of intellectual property hidden in code reviews, issue tickets, and chat threads. As ideas now flow across...more

Orrick, Herrington & Sutcliffe LLP

HealthTech Due Diligence: Key Privacy/Security Factors

Join Thora Johnson and Jeremy Sherer to learn about: Evaluating compliance through privacy notices Key questions to address, from leadership accountability to employee training...more

Bass, Berry & Sims PLC

Amendments to the COPPA Rule Now in Effect

On June 23, significant amendments (Amendments) to the Children’s Online Privacy Protection Act (COPPA) Rule (COPPA Rule) became effective, which increase obligations on many operators of websites and online services. The...more

K2 Integrity

Information Leaks: How to Assess the Impact, Investigate the Cause, and Reduce the Likelihood of Future Breaches

K2 Integrity on

Information leaks can range from internal decisions and salary data to intellectual property, strategy documents, or board minutes. Whether caused by accident or intent, all leaks demand immediate, structured action. Even...more

Wyrick Robbins Yates & Ponton LLP

Not Just for Auto Dealers: What the FTC’s Updated Safeguards Rule Means for All Non-Bank Financial Institutions

Last month, the Federal Trade Commission issued guidance on the updated Safeguards Rule in the form of a set of Frequently Asked Questions for Automobile Dealers. Although directed to auto dealers, the FAQs are a useful...more

Fisher Phillips

AI Governance and Data Minimization in the 5G Era: What Employers and Providers Must Consider Now

Fisher Phillips on

As 5G connectivity becomes more widely deployed, organizations across all industries are leaning into AI tools that promise speed, automation, and deeper insights. But the combined power of 5G + AI creates an urgent...more

Wyrick Robbins Yates & Ponton LLP

California’s New CCPA Cybersecurity Audit Regulations: A Roadmap to “Reasonable” Security?

Last week, the California Privacy Protection Agency (“Agency”) approved adoption of detailed new regulations under the CCPA that will include (among other notable components) a rule requiring annual cybersecurity audits for...more

WilmerHale

AI and GDPR: A Road Map to Compliance by Design - Episode 4: The Deployment Phase

WilmerHale on

The rise of artificial intelligence (AI) and its widespread availability offers significant growth opportunities for businesses. However, it necessitates a robust governance framework to ensure compliance with regulatory...more

Bricker Graydon LLP

Ohio House Bill 96 Ushers in New Era of Cybersecurity Compliance for Local Governments and School Districts

Bricker Graydon LLP on

On June 30, 2025, Governor Mike DeWine signed into law (HB 96), a cybersecurity mandate that applies to all political subdivisions in Ohio—including counties, municipalities, townships, and school districts. ...more

Cooley LLP

Rhode Island Enacts New Financial Institutions Cybersecurity Law With Immediate Effect

Cooley LLP on

As the Consumer Financial Protection Bureau (CFPB) and Federal Trade Commission (FTC) scale back rulemaking and enforcement, states are advancing more prescriptive cybersecurity standards for financial institutions, including...more

WaterStreet Company

2025 Trends in P&C Insurance: Technology, Competition and Innovation

WaterStreet Company on

The U.S. P&C insurance industry is in the midst of profound transformation in 2025, driven largely by rapid technological advancement and evolving risk dynamics. According to Kelly King, a seasoned expert with over 30 years...more

Cooley LLP

AI Note-Taking: Many Things to Ponder

Cooley LLP on

AI note-taking is today’s topic du jour. The first thing to know about this topic is that you need to experience it for yourself to see why it’s so attractive. (I’ll run a blog soon summarizing how AI note-taking works in...more

Verrill

Legal Readiness for AI in Healthcare: A Provider’s Quick Guide

Verrill on

Artificial Intelligence (AI) continues to revolutionize industries and is poised to bring transformative change in healthcare delivery, drug discovery, diagnostics, and data analysis and communication. This technology is...more

A&O Shearman

Mansion House: HMT policy paper on wholesale financial markets digital strategy

A&O Shearman on

HM Treasury has published a policy paper on the wholesale financial markets digital strategy. The purpose of the strategy is to ensure the UK benefits from opportunities to improve its wholesale financial markets, by using...more

Mitratech Holdings, Inc

When Automation Moves Too Fast: The Hidden Risks of AI in Hiring

On June 30, 2025, two security researchers revealed a security oversight that every hiring leader implementing AI should be aware of. Researchers accessed 64 million job application records from Paradox, a conversational AI...more

Woods Rogers

DOD Poised to Finalize CMMC Requirements for Government Contractors

Woods Rogers on

For contractors within the Defense Industrial Base (DIB), the time to ensure compliance with the Department of Defense’s (DOD) Cybersecurity Maturity Model Certification program (CMMC) 2.0 is now. DOD formally sent the final...more

Foley & Lardner LLP

DOJ Enforcement Under the National Security Division’s Data Security Program

Foley & Lardner LLP on

Protecting sensitive data has never been more important. In a globalized world of advanced cyber threats, sophisticated espionage techniques, and external data monetization, increased security is crucial to safeguard...more

8,847 Results
 / 
View per page
Page: of 354

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide