News & Analysis as of

Data Security Compliance

Hanzo

Compliance Under Pressure: Audit Readiness for Healthcare Providers

Hanzo on

In today’s healthcare environment, compliance is a defining element of patient care quality, operational integrity, and public trust. Oversight from agencies such as the Office for Civil Rights (OCR), the Centers for Medicare...more

DLA Piper

Germany: Further Judgment on Non-Material Damages for Loss of Control over Personal Data

DLA Piper on

In its judgment of May 13, 2025 (case number VI ZR 186/22), the German Federal Court of Justice (Bundesgerichtshof – “BGH”) continued its case law on the compensability of non-material damages under Article 82 GDPR, in...more

Health Care Compliance Association (HCCA)

[Event] Healthcare Research Compliance Academy - September 8th - 11th, Scottsdale, AZ

HCCA's Healthcare Research Compliance Academy is a three-and-a-half-day interactive educational program with a focus on the highly specialized and complex regulations and issues that affect research compliance professionals....more

The Volkov Law Group

AI Governance Best Practices (Part II of II)

The Volkov Law Group on

The new world of AI presents significant benefits and risks that need to be addressed in an overall governance framework. Luckily, the principles to apply here will surprise no one — governance, compliance, legal and risk...more

Butler Snow LLP

What Tennessee’s New Privacy Law Means for Your Business

Butler Snow LLP on

On July 1, 2025, Tennessee officially joined the growing list of states enacting consumer privacy laws with the Tennessee Information Protection Act (TIPA). Inspired by the California Consumer Privacy Act, TIPA introduces a...more

Jackson Lewis P.C.

We get Privacy for work — Episode 7: What Is a WISP and Why Your Organization Must Have One

Jackson Lewis P.C. on

Written Information Security Programs, commonly referred to as WISPs, are critical plans to have in place – not only to efficiently and effectively respond to ransomware attacks and data breaches when they occur – but to...more

Warner Norcross + Judd

Avoid the October Surprise: What You Need to Know About DOJ’s New Data Security Program

Warner Norcross + Judd on

The Department of Justice’s (“DOJ”) Data Security Program (“the Program”, 28 C.F.R. Part 202) went into effect on April 8 with a 90-day period of limited enforcement. With DOJ now expecting full compliance, with additional...more

McAfee & Taft

AI: The New Frontier

McAfee & Taft on

Artificial intelligence, generative AI, machine learning, large language models and similar technologies (“AI”) are quickly becoming a mainstay of business software. There is no doubt that AI has endless possibilities as it...more

Mintz - Health Care Viewpoints

“False” Sense of Security: DOJ Announces False Claims Act Settlements Related to Failure to Comply with Cybersecurity Requirements

On July 31, 2025, the United States Department of Justice (DOJ) announced a pair of settlements with companies accused of having violated the False Claims Act (FCA) by falsely representing their compliance with certain...more

Troutman Pepper Locke

Under the Radar: DOJ's Data Security Rules and Their Impact on Payments Companies — Payments Pros – The Payments Law Podcast

Troutman Pepper Locke on

In this episode of Payments Pros, Carlin McCrory is joined by Pete Jeydel, a partner in the firm's White Collar Litigation + Investigations Practice Group, to discuss the new Department of Justice (DOJ) Data Security Program...more

Constangy, Brooks, Smith & Prophete, LLP

What the Sensitive Data Rule means for “bulk data” and National Security compliance

As of July 9, the U.S. Department of Justice has begun full enforcement of a sweeping new data regulation known as the Sensitive Data Rule, or “SDR.” Implemented under President Biden’s Executive Order 14117, the SDR marks a...more

Hanzo

Your IP Is Everywhere: How to Protect and Collect Sensitive Content Across Collaboration Tools

Hanzo on

When a key engineer leaves for a competitor, they can take more than just experience, they may walk away with years of intellectual property hidden in code reviews, issue tickets, and chat threads. As ideas now flow across...more

Bass, Berry & Sims PLC

Amendments to the COPPA Rule Now in Effect

On June 23, significant amendments (Amendments) to the Children’s Online Privacy Protection Act (COPPA) Rule (COPPA Rule) became effective, which increase obligations on many operators of websites and online services. The...more

Wyrick Robbins Yates & Ponton LLP

California’s New CCPA Cybersecurity Audit Regulations: A Roadmap to “Reasonable” Security?

Last week, the California Privacy Protection Agency (“Agency”) approved adoption of detailed new regulations under the CCPA that will include (among other notable components) a rule requiring annual cybersecurity audits for...more

Woods Rogers

DOD Poised to Finalize CMMC Requirements for Government Contractors

Woods Rogers on

For contractors within the Defense Industrial Base (DIB), the time to ensure compliance with the Department of Defense’s (DOD) Cybersecurity Maturity Model Certification program (CMMC) 2.0 is now. DOD formally sent the final...more

Jackson Lewis P.C.

Harnessing AI Under ERISA: A Compliance and Oversight Guide for Retirement and Health Plan Fiduciaries

Jackson Lewis P.C. on

It is increasingly evident that artificial intelligence (AI) is reshaping all facets of business, and its impact on employee benefit plans is no exception. From automating plan administration to personalizing participant...more

NAVEX

The 5-Step Compliance Risk Management Process: A No-Nonsense Guide

NAVEX on

Your risk and compliance functions are probably costing you more than they should. Not just in budget, but in drag. When your functions are siloed, they create redundant work, blind spots and a bad habit of reactivity that...more

Carlton Fields

No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats

Carlton Fields on

On this episode, hosts Jack Clabby of Carlton Fields and Kayley Melton, executive director of operations at the Cognitive Security Institute, sit down with Kurt Sanger — a seasoned cyber law leader and former deputy general...more

DLA Piper

CHINA: Definition and Handling of Sensitive Personal Information Helpfully Clarified

DLA Piper on

It’s well-known that China’s data protection laws define sensitive personal information very differently to other jurisdictions. Instead of a closed list of data types, sensitive personal information in China has...more

Mayer Brown

Hong Kong Privacy Commissioner for Personal Data Completes Compliance Checks on the Use of AI and Data Privacy

Mayer Brown on

INTRODUCTION - Artificial intelligence ("AI") has rapidly transitioned from experimental use to widespread adoption across Hong Kong. Organisations are now leveraging AI models to enhance customer service, improve risk...more

Mayer Brown

China Proposes Amendments to the Cybersecurity Law

Mayer Brown on

INTRODUCTION - Almost eight years after the Cybersecurity Law (“CSL”) came into force in the PRC in 2017, the Cyberspace Administration of China (“CAC”) issued draft amendments to the CSL (“2025 Draft Amendments”) on 28...more

Dickinson Wright

Ohio’s Cyber Law For Local Governments: 5 Steps Over 75 Days to Meet the September 29 Deadline

Dickinson Wright on

In its FY 2026 budget, Ohio quietly folded in a sweeping cybersecurity mandate that will require every “political subdivision” to have a cybersecurity program that aligns with recognized industry frameworks and adopt strict...more

Lighthouse

Data Loss Prevention in the Age of AI: A New Landscape Demands New Approaches

Lighthouse on

Learn how to enhance your approach to data loss prevention with AI in mind, including what capabilities are essential for your organization and how to deploy Microsoft Purview DLP to address your needs. The information...more

Morrison & Foerster LLP - Government...

What Contractors Need to Know About DoD’s New IP Guidebook

Earlier this year, the Department of Defense (DoD) published an “Intellectual Property Guidebook for DoD Acquisition.” It is the culmination of many years of work and the most insightful data rights guidance out of the...more

NAVEX

AI in Healthcare: Why Compliance Can’t Afford to Fall Behind

NAVEX on

The healthcare sector is rapidly embracing artificial intelligence (AI), from predictive diagnostics and clinical decision support to patient engagement and operational automation. With this innovation comes an urgent...more

742 Results
 / 
View per page
Page: of 30

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide