News & Analysis as of

Data Security Data Management Cybersecurity

HaystackID

Safeguarding the Corporate Network Against Breaches through Information Governance

HaystackID on

While corporate leaders often view cybersecurity as a technical challenge, contributing author Phil Favro illustrates the legal and organizational dimensions of cybersecurity in this recent article. Favro emphasizes that...more

Troutman Pepper Locke

3 Takeaways From Recent Cyberattacks On Healthcare Cos.

Troutman Pepper Locke on

Significant data breaches have affected major players in the healthcare industry in the last year, with the methods of attack being as diverse as the affected entities themselves. Originally published in Law360 - June 4,...more

BakerHostetler

[Event] Data Dilemmas: Avoiding the Road to Ruin - September 25th, Atlanta, GA

BakerHostetler on

Data is at the center of our digital economy and provides endless ways to interact and connect with customers. Maintaining more data means taking on more risk. Join us for an interactive program that begins in the middle of a...more

Lighthouse

Using Purview Sensitivity Labels to Reduce Data Risks in M365

Lighthouse on

Learn how Microsoft Purview sensitivity labels, coupled with a sound data classification strategy, reduce over-exposure without hampering collaboration. M365 expert Marta Pucci explains what labels do, the strategic benefits...more

Pagefreezer

A Guide to Remote Work Compliance

Pagefreezer on

The COVID-19 pandemic caused office workers to start working from home—but businesses should expect remote work to last a long time. Beyond the unpredictability of this pandemic, 99% of remote workers want to continue...more

BakerHostetler

[Podcast] The Data Stream – Episode 1 with Ted Kobus

BakerHostetler on

The Data Stream podcast dives deep into the fast-moving currents of data, technology, and the law. Presented by BakerHostetler’s Digital Assets and Data Management (DADM) Practice Group and hosted by Partners David Sherman...more

Baker Donelson

Web Scraping and the Rise of Data Access Agreements: Best Practices to Regain Control of Your Data

Baker Donelson on

As the race for real-time data access intensifies, organizations are confronting a growing legal and operational challenge: web scraping. What began as a fringe tactic by hobbyists has evolved into a sophisticated,...more

Troutman Pepper Locke

Cleared for Takeoff? Copilot Legal and Technical Preflight Checklist

Troutman Pepper Locke on

Millions of companies use the Microsoft 365 suite of tools every day to create, communicate, and collaborate, but far fewer have adequately grappled with the legal risks introduced by Copilot, the powerful generative AI...more

A&O Shearman

US, Australian, New Zealand and UK cybersecurity agencies publish guidance on best practices for securing data used to train and...

A&O Shearman on

On May 22 2025, the cybersecurity agencies from the US, UK, Australia, and New Zealand published a Cybersecurity Information Sheet (CIS) on ensuring that data used to train and use artificial intelligence (AI) and machine...more

Dacheng

China Monthly Data Protection Update: May 2025

Dacheng on

This monthly report outlines key developments in China’s data protection sector for May. The following events merit special attention...more

Morgan Lewis - Tech & Sourcing

The Latest Trends in Moving ERP Systems to the Cloud

According to Forbes, “in 2025, the landscape of enterprise resource planning (ERP) is set for a thrilling transformation,” with a shift toward cloud-native ERP solutions at the top of the list....more

BakerHostetler

Data Governance: Practical Considerations for a Reasonable Security Program

BakerHostetler on

Imagine receiving an email from an unknown actor claiming to have taken approximately 2 terabytes of data from your organization’s network. The threat actor provides a file tree and sample files to substantiate its claim....more

Constangy, Brooks, Smith & Prophete, LLP

What personal data are you unknowingly hoarding?

With the number of data breaches increasing each year, it’s becoming more important to know what personal data you have and where you have it. On personal or even work devices, you may be surprised at how much of your data is...more

Mitratech Holdings, Inc

IT/DR Plan Spring Cleaning: How to Replace Outdated Policies

Ready to ditch outdated guidelines and adopt a fresh take on your IT Disaster Recovery plans? Spring is the season of renewal, making it the perfect time to refresh not only physical spaces but also strategies and...more

Dacheng

DeepSeek and China’s AI Regulatory Landscape: Rules, Practice and Future Prospects

Dacheng on

During the 2025 Chinese New Year, DeepSeek, a Chinese artificial intelligence (“AI”) model, garnered intense global attention and sparked heated discussions. It surpassed ChatGPT, which had been in the spotlight previously,...more

Lighthouse

Strategic Insights for Safeguarding Information with Microsoft Purview

Lighthouse on

Successful Microsoft Purview deployments require more than just technical implementation—they demand strategic planning, cross-functional collaboration, and ongoing optimization. Read about the key steps required to...more

Seyfarth Shaw LLP

Cybersecurity In Construction: How To Effectively Mitigate Cyber Risk

Seyfarth Shaw LLP on

The construction industry’s reliance on digital data and devices has reshaped the construction process. When used properly, digital technology facilitates collaboration and increases productivity. However, growing dependence...more

Frost Brown Todd

Managing Data Security and Privacy Risks in Enterprise AI

Frost Brown Todd on

Artificial intelligence (AI), particularly generative AI, thrives on vast amounts of data, fueling AI capabilities, insights, and predictions. But with this reliance on data comes potential privacy and security risks. And...more

IR Global

Data Protection in the Digital Age

IR Global on

With data becoming one of the most valuable assets, protecting it is not just a legal obligation but a business imperative....more

Purpose Legal

Seamless Integration: Why Infrastructure-as-a-Service is Essential for eDiscovery

Purpose Legal on

Infrastructure-as-a-Service (IaaS) is a vital model for law firms seeking better ways to organize eDiscovery data and streamline the discovery process. With thousands of documents and pieces of information to collect,...more

Hogan Lovells

Vietnam's new Law on Data

Hogan Lovells on

On 30 November 2024, the National Assembly of Vietnam passed the Law on Data ("Law on Data"), which will govern digital data-related activities, and come into effect on 1 July 2025. This new Law on Data, along with the...more

NAVEX

Artificial Intelligence and Compliance: Preparing for the Future of AI Governance, Risk, and Compliance 

NAVEX on

Artificial Intelligence has rapidly moved from theoretical to transformational, profoundly changing how businesses operate across industries. While the benefits of AI, particularly Generative AI (genAI), are monumental, these...more

HaystackID

[EDRM Workshop Transcript] Managing Data Overload and Complexity in Catastrophic Events

HaystackID on

Editor’s Note: Managing data effectively can make the difference between success and failure in high-pressure situations, such as natural disasters and international investigations. A recent EDRM workshop provided a rare...more

Array

Emerging Trends in Court Reporting for 2025: Legal Technology and Advantages for Law Firms

Array on

The court reporting industry is evolving rapidly, propelled by technological advancements and the increasing demand for efficiency in the legal sector. For 2025, trends such as artificial intelligence (AI), real-time...more

Purpose Legal

Understanding the Basics of eDiscovery Processing

Purpose Legal on

In today’s digital world, the way we handle information has transformed dramatically. With this transformation, eDiscovery has become an essential part of legal proceedings and investigations. Whether you’re involved in a...more

138 Results
 / 
View per page
Page: of 6

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide