News & Analysis as of

Data Security Policies and Procedures

Farella Braun + Martel LLP

Understanding the Importance of Data Asset Protection: Why Wineries Need to Pay Attention to Policies and Procedures

Data asset protection is traditionally associated with industries and entities that develop or store particularly sensitive information, like tech companies, hospitals, law firms, and government entities. However, data asset...more

Best Era

Law Firms Have a Massive AI Problem They're Pretending Doesn't Exist

Best Era on

Your associates are using ChatGPT. Right now. While you're reading this. According to Pew Research data from June 2025, 34% of U.S. adults have used ChatGPT, double the rate from 2023. Among adults under 30, that number jumps...more

Dinsmore & Shohl LLP

Making Your Business Cyber Secure

Dinsmore & Shohl LLP on

One key lesson from the ongoing ransomware epidemic is clear: threat actors don’t discriminate. It doesn’t matter who you are or what your business does — if they see an opening, they’ll exploit it, ready or not. Despite...more

Ward and Smith, P.A.

Why Your Employees Are Your Biggest Trade Secret Risk (And What NC Business Owners Can Do About It)

Ward and Smith, P.A. on

While external cyber threats make headlines, the reality is that your biggest risk often comes from within. For North Carolina businesses, from tech startups in Durham to manufacturers in Greensboro, understanding how to...more

Downs Rachlin Martin PLLC

Protecting Your Team's Data: What Every Employer Needs to Know

Let’s talk about something that doesn’t get enough attention: protecting your employees’ sensitive personal information. In today’s digital world, keeping your team’s data safe isn’t just a nice-to-have—it’s absolutely...more

Pagefreezer

A Guide to Remote Work Compliance

Pagefreezer on

The COVID-19 pandemic caused office workers to start working from home—but businesses should expect remote work to last a long time. Beyond the unpredictability of this pandemic, 99% of remote workers want to continue...more

The Volkov Law Group

AI Governance Best Practices (Part II of II)

The Volkov Law Group on

The new world of AI presents significant benefits and risks that need to be addressed in an overall governance framework. Luckily, the principles to apply here will surprise no one — governance, compliance, legal and risk...more

Jackson Lewis P.C.

We get Privacy for work — Episode 7: What Is a WISP and Why Your Organization Must Have One

Jackson Lewis P.C. on

Written Information Security Programs, commonly referred to as WISPs, are critical plans to have in place – not only to efficiently and effectively respond to ransomware attacks and data breaches when they occur – but to...more

Shipman & Goodwin LLP

AI in the Factory: What Manufacturers Must Consider

Shipman & Goodwin LLP on

As generative artificial intelligence and machine learning continue their rapid rise in popularity and uses in business operations, manufacturers are faced with how to implement AI in a manner that allows them to take...more

Womble Bond Dickinson

AI Governance Playbook: Building an AI Governance Program that Works

Womble Bond Dickinson on

This article is based on a presentation at Womble Bond Dickinson’s AI Intensive: Playbook for Innovation and Risk Mitigation virtual summit, which took place May 20, 2025, along with additional insights from the authors....more

Pagefreezer

5 Critical Questions to Ask Before Implementing a Team Collaboration Tool

Pagefreezer on

There are a lot of benefits to implementing a team collaboration tool like Workplace from Meta. As I’ve written before, an enterprise social network can improve communication, streamline collaboration, and even improve and...more

Lighthouse

Data Loss Prevention in the Age of AI: Deploying Microsoft Purview DLP

Lighthouse on

The second post in our data loss prevention series offers a roadmap for implementing Microsoft Purview DLP to secure sensitive data in AI-influenced environments. From discovery and classification to policy enforcement,...more

NAVEX

The 5-Step Compliance Risk Management Process: A No-Nonsense Guide

NAVEX on

Your risk and compliance functions are probably costing you more than they should. Not just in budget, but in drag. When your functions are siloed, they create redundant work, blind spots and a bad habit of reactivity that...more

Dinsmore & Shohl LLP

Recent OCR Settlements Emphasize the Need for Thorough HIPAA Risk Analysis

Dinsmore & Shohl LLP on

Two settlements recently announced by the U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR) reinforce the agency’s emphasis on promoting thorough risk analysis to help prevent disclosure of...more

Patomak Global Partners

American Bankers Association Conference Focused on AI

In June 2025, the ABA held its annual Risk and Compliance Conference. The conference heavily focused on how banks are leveraging AI to support front-, middle-, and back-office functions. Conference participants noted that...more

Mitratech Holdings, Inc

5 Challenges in Incident Management (and How to Stay Resilient)

A single outage can spiral into hours of downtime, frustrated customers, and significant revenue loss across your business....more

Blake, Cassels & Graydon LLP

Ontario : Nouveau guide de gestion de la protection de la vie privée à l’intention des petits organismes de soins de santé

La Commissaire à l’information et à la protection de la vie privée de l’Ontario (la « CIPVP ») a publié un nouveau guide de gestion de la protection de la vie privée (le « Guide ») ayant pour but d’aider les petits organismes...more

Paul Hastings LLP

The Changing Cyber Threat Landscape and Lessons Learned From Data Breaches

Paul Hastings LLP on

Last month, Paul Hastings sponsored the Cybersecurity Law Workshop at the Spring Privacy & Security Forum held at George Washington University in Washington, D.C. The Cybersecurity Law Workshop featured three panels of...more

Fisher Phillips

New SEC Cybersecurity Compliance Deadlines are Coming: What 5 Things Should Covered Institutions Do to Prepare?

Fisher Phillips on

The SEC’s amended Regulation S-P, adopted last year, will soon enhance data privacy protections for broker-dealers, investment companies, registered investment advisors, and transfer agents. The updated rule requires these...more

Morgan Lewis - Tech & Sourcing

NIST Releases Updated Incident Response Guidance Under Its Cybersecurity Framework

During the Biden administration, there was a push to prioritize and modernize cybersecurity responses, and the National Institute of Standards and Technology (NIST) agreed to work with the technology industry to develop a new...more

Paul Hastings LLP

NFL Draft Provides Wake-Up Call on Protecting Confidential Information While Working Remotely

Paul Hastings LLP on

Last week’s NFL draft highlighted more than the accomplishments of athletes at the combine or on the field. While there was extensive coverage of the merits of each player, one of the major headlines coming out of the draft...more

Ankura

Generative AI Risks: Legal and Compliance Insights - Part 2

Ankura on

The Bottomline: Five Practical Steps for Generative AI Risk Management - As the first line of defense, employees within business operations must own and manage risks related to the business, including risks resulting from...more

Health Care Compliance Association (HCCA)

[Event] Healthcare Privacy Compliance Academy - June 9th - 12th, Pittsburgh, PA

HCCA's Healthcare Privacy Compliance Academy is a three-and-a-half-day interactive education program with a focus on the vast body of privacy laws and regulations in place to help you protect PHI and other critical data. Our...more

Wolf, Greenfield & Sacks, P.C.

Spring Cleaning and Tune-up for Your Trade Secret Portfolio: Eight Steps

Spring has arrived, and in addition to cleaning, it’s a good time to reassess how your company is handling its trade secrets. Far from being static, trade secret innovations, processes, and data evolve over time. Business...more

Bennett Jones LLP

10 Key Questions to Guide Cyber Risk Management

Bennett Jones LLP on

Asking the right questions within your organization is key to effectively managing cyber risk. Here are 10 questions that you should ask your team...more

292 Results
 / 
View per page
Page: of 12

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide