News & Analysis as of

Data Security Best Practices

Ice Miller

[Webinar] Cybersecurity Collaboration: Informing and Empowering the Defense Industrial Base - September 10th, 12:00 pm - 1:00 pm...

Ice Miller on

Join us for a timely and topical webinar hosted by Ice Miller, LLP, discussing cybersecurity collaboration and information sharing in the defense industrial base. The webinar also will feature a robust discussion of best...more

BakerHostetler

[Event] Data Dilemmas: Avoiding the Road to Ruin - September 25th, Atlanta, GA

BakerHostetler on

Data is at the center of our digital economy and provides endless ways to interact and connect with customers. Maintaining more data means taking on more risk. Join us for an interactive program that begins in the middle of a...more

Best Era

Law Firms Have a Massive AI Problem They're Pretending Doesn't Exist

Best Era on

Your associates are using ChatGPT. Right now. While you're reading this. According to Pew Research data from June 2025, 34% of U.S. adults have used ChatGPT, double the rate from 2023. Among adults under 30, that number jumps...more

Jackson Lewis P.C.

[Event] Workplace Horizons Extension: Chicago - September 18th, Chicago, IL

Jackson Lewis P.C. on

The leading educational and networking event — from the premier firm for employment + labor law — comes closer to you regionally and topically. The benefits of Jackson Lewis’ annual Workplace Horizons conference in New...more

Epiq

Outside Counsel Guidelines: Built to Evolve, Designed to Align

Epiq on

Outside Counsel Guidelines (OCGs) are more than static billing recommendations; they are living and breathing instructions that align teams with corporate values, risk tolerance, and operational expectations. While other...more

Fisher Phillips

New Lawsuit Highlights Concerns About AI Notetakers: 7 Steps Businesses Should Take

Fisher Phillips on

A new lawsuit just filed against Otter.ai underscores the legal and compliance risks companies face when using AI notetakers – and serves as a good reminder to deploy best practices to reduce your risks. The August 15 case...more

Fish & Richardson

The Promise and Peril of AI in Legal Practice

Fish & Richardson on

Artificial Intelligence (AI) is transforming the legal profession, offering tremendous opportunities to enhance efficiency and access to justice. While AI tools are reshaping how legal professionals operate, the use of AI in...more

The Volkov Law Group

AI Governance Best Practices (Part II of II)

The Volkov Law Group on

The new world of AI presents significant benefits and risks that need to be addressed in an overall governance framework. Luckily, the principles to apply here will surprise no one — governance, compliance, legal and risk...more

Ankura

Engineering Confidence: 14 Critical Questions for Secure LLM and RAG Deployment

Ankura on

The rapid evolution of large language models (LLMs), retrieval-augmented generation (RAG), and Model Protocol Context (MCP) implementation has led many developers and teams to quickly adopt and integrate these powerful...more

Hogan Lovells

Asia-Pacific privacy authorities publish data anonymisation guide

Hogan Lovells on

On 1 August 2025, the Privacy Commissioner for Personal Data, Hong Kong (“PCPD”), and the Personal Data Protection Bureau, Macao (“PDPB”), in collaboration with seven other privacy and data protection authorities across...more

Shipman & Goodwin LLP

AI in the Factory: What Manufacturers Must Consider

Shipman & Goodwin LLP on

As generative artificial intelligence and machine learning continue their rapid rise in popularity and uses in business operations, manufacturers are faced with how to implement AI in a manner that allows them to take...more

American Conference Institute (ACI)

[Event] National Conference on AI Law, Ethics, Safety & Compliance - October 8th - 9th, Washington, DC

ACI’s National Conference on AI Law, Ethics, Safety & Compliance delivers a practical roadmap to implement and evolve your AI strategy while navigating its legal, ethical, and technical complexities. Gain actionable...more

Constangy, Brooks, Smith & Prophete, LLP

Cybersecurity challenges in the health care industry: Legal, regulatory, and risk considerations

Health care remains one of the most targeted and vulnerable sectors when it comes to cyberattacks. In fact, a recent breach at a major health care analytics firm exposed the data of 5.4 million U.S. patients, making it one of...more

Hogan Lovells

ECB Guide on outsourcing cloud services to cloud service providers

Hogan Lovells on

The European Central Bank (ECB) has published its Guide on outsourcing cloud services to cloud service providers (the "Guide") clarifying how banks are expected to comply with obligations under the EU Digital Operational...more

Morgan Lewis - Tech & Sourcing

Navigating the 2025 Cybersecurity Landscape: Data Breaches, Rising Costs, and CISA’s Evolving Role

In June 2025, cybersecurity researchers discovered a leak of 16 billion passwords in one of the largest data breaches ever, impacting a wide range of platforms and placing billions of users’ information at risk. This incident...more

K2 Integrity

Social Media Day: Educating Employees On The Risks Of Social Media

K2 Integrity on

Social media is used by both organizations and employees—as a marketing tool for business, for entertainment, or for interacting with friends and family....more

Morgan Lewis

Trade Secrets in the Automotive Industry

Morgan Lewis on

As recent innovations in automotive technology continue to fuel unprecedented growth across the industry, companies must adapt their privacy and confidentiality capabilities to safeguard highly valuable trade secrets. With...more

Strafford

[Webinar] AI and the Legal Industry: Ethical Issues, Privacy/Security Considerations, Best Practices for Using AI - Navigating...

Strafford on

This CLE webinar will guide counsel on navigating the challenges when using AI in the practice of law. The panel will address ethical issues and privacy and security considerations. The panel will also offer best practices...more

American Conference Institute (ACI)

[Webinar] Operationalizing AI: Governance, Culture, Bias, Privacy, Data and Cyber Security Considerations - June 24th, 1:00 pm -...

This complimentary webinar will delve into the real-life aspects of implementation – with a focus on organizational preparedness and proactive strategic foresight. Join us as we discuss how to design and roll out a...more

Davis Wright Tremaine LLP

NSA Issues Cybersecurity Guidance and Best Practices for AI Systems

The National Security Agency (NSA), in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and cybersecurity agencies from Australia, New Zealand, and the...more

Jackson Lewis P.C.

Different Country, Same Challenges: Lessons from a Breach That Could Have Been Prevented

Jackson Lewis P.C. on

A recent breach involving Indian fintech company Kirana Pro serves as a reminder to organizations worldwide: even the most sophisticated cybersecurity technology cannot make up for poor administrative data security hygiene....more

Fox Rothschild LLP

Best Practices for Securing Data Used to Train and Operate AI Systems

Fox Rothschild LLP on

The National Security Agency’s Artificial Intelligence, Security Center (AISC), together with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Australian Signals...more

Alston & Bird

UK Publishes Software Security Code

Alston & Bird on

Cyber security supply chain risks are growing, and attacks on vendors and other third parties cause severe disruption to businesses. For example, in recent years we have seen many incidents that have involved threat actors...more

Ankura

The Importance of Culture in an Effective Cybersecurity Program

Ankura on

While technology plays a pivotal role in cybersecurity, the human element is equally crucial. An organization's culture can significantly influence the effectiveness of its cybersecurity measures. A strong cybersecurity...more

Conn Maciel Carey LLP

Best Practices to Safeguard Your Company’s Trade Secrets — Case Study

Conn Maciel Carey LLP on

The number one risk for trade secrets exfiltration is from insider threats—employees, contractors, or even executives with access to sensitive information who either intentionally or accidentally compromise it. Sometimes it’s...more

287 Results
 / 
View per page
Page: of 12

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide