News & Analysis as of

Data Security Compliance Cybersecurity

Ward and Smith, P.A.

Data Security and National Security: Are You the Weak Link?

Ward and Smith, P.A. on

International cybercrime is not new.  As a business owner in today's interconnected economy, you know all about the need to protect your technology, financial accounts, business operations, and customer data from digital...more

Hanzo

Compliance Under Pressure: Audit Readiness for Healthcare Providers

Hanzo on

In today’s healthcare environment, compliance is a defining element of patient care quality, operational integrity, and public trust. Oversight from agencies such as the Office for Civil Rights (OCR), the Centers for Medicare...more

Jackson Lewis P.C.

We get Privacy for work — Episode 7: What Is a WISP and Why Your Organization Must Have One

Jackson Lewis P.C. on

Written Information Security Programs, commonly referred to as WISPs, are critical plans to have in place – not only to efficiently and effectively respond to ransomware attacks and data breaches when they occur – but to...more

Warner Norcross + Judd

Avoid the October Surprise: What You Need to Know About DOJ’s New Data Security Program

Warner Norcross + Judd on

The Department of Justice’s (“DOJ”) Data Security Program (“the Program”, 28 C.F.R. Part 202) went into effect on April 8 with a 90-day period of limited enforcement. With DOJ now expecting full compliance, with additional...more

Mintz - Health Care Viewpoints

“False” Sense of Security: DOJ Announces False Claims Act Settlements Related to Failure to Comply with Cybersecurity Requirements

On July 31, 2025, the United States Department of Justice (DOJ) announced a pair of settlements with companies accused of having violated the False Claims Act (FCA) by falsely representing their compliance with certain...more

Troutman Pepper Locke

Under the Radar: DOJ's Data Security Rules and Their Impact on Payments Companies — Payments Pros – The Payments Law Podcast

Troutman Pepper Locke on

In this episode of Payments Pros, Carlin McCrory is joined by Pete Jeydel, a partner in the firm's White Collar Litigation + Investigations Practice Group, to discuss the new Department of Justice (DOJ) Data Security Program...more

Constangy, Brooks, Smith & Prophete, LLP

What the Sensitive Data Rule means for “bulk data” and National Security compliance

As of July 9, the U.S. Department of Justice has begun full enforcement of a sweeping new data regulation known as the Sensitive Data Rule, or “SDR.” Implemented under President Biden’s Executive Order 14117, the SDR marks a...more

Hanzo

Your IP Is Everywhere: How to Protect and Collect Sensitive Content Across Collaboration Tools

Hanzo on

When a key engineer leaves for a competitor, they can take more than just experience, they may walk away with years of intellectual property hidden in code reviews, issue tickets, and chat threads. As ideas now flow across...more

Wyrick Robbins Yates & Ponton LLP

California’s New CCPA Cybersecurity Audit Regulations: A Roadmap to “Reasonable” Security?

Last week, the California Privacy Protection Agency (“Agency”) approved adoption of detailed new regulations under the CCPA that will include (among other notable components) a rule requiring annual cybersecurity audits for...more

Woods Rogers

DOD Poised to Finalize CMMC Requirements for Government Contractors

Woods Rogers on

For contractors within the Defense Industrial Base (DIB), the time to ensure compliance with the Department of Defense’s (DOD) Cybersecurity Maturity Model Certification program (CMMC) 2.0 is now. DOD formally sent the final...more

Jackson Lewis P.C.

Harnessing AI Under ERISA: A Compliance and Oversight Guide for Retirement and Health Plan Fiduciaries

Jackson Lewis P.C. on

It is increasingly evident that artificial intelligence (AI) is reshaping all facets of business, and its impact on employee benefit plans is no exception. From automating plan administration to personalizing participant...more

Carlton Fields

No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats

Carlton Fields on

On this episode, hosts Jack Clabby of Carlton Fields and Kayley Melton, executive director of operations at the Cognitive Security Institute, sit down with Kurt Sanger — a seasoned cyber law leader and former deputy general...more

Mayer Brown

China Proposes Amendments to the Cybersecurity Law

Mayer Brown on

INTRODUCTION - Almost eight years after the Cybersecurity Law (“CSL”) came into force in the PRC in 2017, the Cyberspace Administration of China (“CAC”) issued draft amendments to the CSL (“2025 Draft Amendments”) on 28...more

Dickinson Wright

Ohio’s Cyber Law For Local Governments: 5 Steps Over 75 Days to Meet the September 29 Deadline

Dickinson Wright on

In its FY 2026 budget, Ohio quietly folded in a sweeping cybersecurity mandate that will require every “political subdivision” to have a cybersecurity program that aligns with recognized industry frameworks and adopt strict...more

Lighthouse

Data Loss Prevention in the Age of AI: A New Landscape Demands New Approaches

Lighthouse on

Learn how to enhance your approach to data loss prevention with AI in mind, including what capabilities are essential for your organization and how to deploy Microsoft Purview DLP to address your needs. The information...more

Dacheng

China Monthly Data Protection Update: July 2025

Dacheng on

This monthly report outlines key developments in China’s data protection sector for July. The following events merit special attention: CAC Issues Third Edition of the Data Export Security Assessment Application Guide: On...more

Mitratech Holdings, Inc

5 Challenges in Incident Management (and How to Stay Resilient)

A single outage can spiral into hours of downtime, frustrated customers, and significant revenue loss across your business....more

Dacheng

Decoding the Regulation of “Important Data” in China and the U.S.: Similarities and Differences, Compliance Obligations, and...

Dacheng on

With the rapid development of informatization, how to better safeguard national security in an increasingly complex information environment has become a critical consideration in digital legislation. A key issue within this...more

HaystackID

AI Summaries in Google Discover: Rethinking Information Governance, Discovery, and Security

HaystackID on

In a bold initiative to integrate AI across various platforms, Google has launched AI-generated summaries in its Discover product, a personalized news feed widely accessible on Android and iOS devices. These AI summaries...more

Clark Hill PLC

Key lessons on the False Claims Act for government contractors after Raytheon’s $8.4 million settlement

Clark Hill PLC on

Government contractors should be on high alert following the recent announcement that Raytheon Company, its parent RTX Corporation, and Nightwing Group, LLC, have agreed to pay $8.4 million to resolve allegations of violating...more

Sheppard Mullin Richter & Hampton LLP

DOJ’s 90-Day Data Security Compliance Grace Period is Over: Are You Compliant?

The U.S. Department of Justice (“DOJ”) Data Security Program (“DSP”) 90-day enforcement grace period ended as of July 8, 2025. While the program became effective April 8, 2025, DOJ implemented a 90-day enforcement grace...more

Hanzo

Multiple Slack Workspaces, One Governance Strategy: Here’s How to Get It Right

Hanzo on

Managing collaboration at enterprise scale is inherently complex, especially when your organization operates across multiple workspaces. As teams become more distributed, compliance demands intensify, and business units push...more

Davis Wright Tremaine LLP

FERC Moves To Bolster Cybersecurity

On June 26, FERC approved a new reliability standard (CIP-015-1) proposed by the North American Electric Reliability Corporation ("NERC") to enhance cybersecurity of the nation's bulk electric system ("BES"). In a related...more

Mitratech Holdings, Inc

The 2025 TPRM Study: Key Findings and Recommendations

The 2025 Mitratech Third-Party Risk Management (TPRM) Study conveys a clear message: the third-party risk landscape is evolving into a complex, interconnected ecosystem — one where every vendor, supplier, and partner plays a...more

McCarter & English Blog: Government Contracts...

Building the Cyber Fortress: New Cybersecurity Executive Order Targets Quantum, AI, and Supply Chain Security

On June 6, 2025, President Trump issued a new executive order, “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144” (EO), signaling the construction...more

364 Results
 / 
View per page
Page: of 15

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide