News & Analysis as of

Data Security Gramm-Leach-Blilely Act Information Security

Fox Rothschild LLP

FTC Issues GLBA Safeguard Rule FAQs: What Motor Vehicle Dealers Need to Know

Fox Rothschild LLP on

The FTC has issued FAQs for Gramm-Leach-Bliley Act (GLBA) Safeguards Rule compliance by Motor Vehicle Dealers. Here is what you need to know: Step 1: Are you a financial institution? • You are if you either finance (or...more

Fisher Phillips

Steering Your Auto Dealership into Compliance with New Information Security Rules: A 9-Step Guide

Fisher Phillips on

Auto dealerships that provide financing are subject to the Gramm Leach Bliley Act (GLBA). That’s the old news. What’s new is that GLBA-covered businesses have until December 9 to implement significant changes to their...more

Oberheiden P.C.

Are You a Financial Institution? GLBA Law & Compliance

Oberheiden P.C. on

The Gramm-Leach-Bliley Act (GLBA) is a federal law that establishes various legal requirements for companies that qualify as “financial institutions” under the Act. The GLBA’s definition of a “financial institution” is...more

Husch Blackwell LLP

[Webinar] U.S. Privacy Law Update: Analyzing the Colorado Privacy Act - June 15th, 11:00 am - 12:00 pm CDT

Husch Blackwell LLP on

The Colorado legislature just passed the Colorado Privacy Act (CPA). Once signed by the Governor, Colorado will become just the third state – after California and Virginia – to enact broad consumer data privacy legislation....more

Faegre Drinker Biddle & Reath LLP

ED Requires Higher Education Audits to Review GLBA Data Security Compliance

As discussed in a previous DBR on Data post, the U.S. Department of Education (“ED”) in recent years has repeatedly emphasized the importance of higher education institutions taking all appropriate measures to secure and...more

Harris Beach Murtha PLLC

The Importance of Information Security Plans

In the first installation of our weekly series during National Cybersecurity Awareness Month, we examine information security plans (ISP) as part of an overall cybersecurity strategy. Regardless of the size or function of an...more

Pillsbury - Global Sourcing Practice

Under the Thumb: Regulatory Compliance When Outsourcing Cybersecurity Management

Managed security services are often a natural “add-on” when outsourcing IT services given that data protection is integral to application development, software as a service, and cloud storage, among other services. More...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide