News & Analysis as of

Data Security Third-Party

Robinson+Cole Data Privacy + Security Insider

Attack Against Salesloft Drift App Includes Google Workspace

An attack against Salesforce between August 8 and August 18 targeting data through its Salesloft Drift app “is more extensive than at first thought.” The attack targeted numerous Salesforce customers “systematically...more

Hanzo

Compliance Under Pressure: Audit Readiness for Healthcare Providers

Hanzo on

In today’s healthcare environment, compliance is a defining element of patient care quality, operational integrity, and public trust. Oversight from agencies such as the Office for Civil Rights (OCR), the Centers for Medicare...more

Katten Muchin Rosenman LLP

The CFPB is Reconsidering Personal Financial Data Rights Rule Under the Dodd-Frank Act

On August 22, 2025, the Consumer Financial Protection Bureau (CFPB) issued an advance notice of proposed rulemaking seeking public comment on potential revisions to its Personal Financial Data Rights Rule (the Rule) under...more

Warner Norcross + Judd

Avoid the October Surprise: What You Need to Know About DOJ’s New Data Security Program

Warner Norcross + Judd on

The Department of Justice’s (“DOJ”) Data Security Program (“the Program”, 28 C.F.R. Part 202) went into effect on April 8 with a 90-day period of limited enforcement. With DOJ now expecting full compliance, with additional...more

Ankura

Engineering Confidence: 14 Critical Questions for Secure LLM and RAG Deployment

Ankura on

The rapid evolution of large language models (LLMs), retrieval-augmented generation (RAG), and Model Protocol Context (MCP) implementation has led many developers and teams to quickly adopt and integrate these powerful...more

Robinson+Cole Data Privacy + Security Insider

Adidas and UChicago Sued Over Data Breaches Caused by Third-Party Vendors

What do a global sportswear giant and a prestigious medical center have in common? Apparently, a shared struggle defending data breach lawsuits for breaches of sensitive personal information caused by third-party vendors....more

Seyfarth Shaw LLP

CPPA Underscores That Businesses Own CCPA Compliance – Even When Privacy Management Tools Fail

Seyfarth Shaw LLP on

The California Privacy Protection Agency (“CPPA”) has made it abundantly clear: privacy compliance isn’t just about publishing the right disclosures – it’s about whether your systems actually work. On May 6, the agency fined...more

Baker Botts L.L.P.

CCPA Class Actions Without a Data Breach; Courts Signal a New Litigation Frontier.

Baker Botts L.L.P. on

Two recent decisions from the Northern District of California—Shah v. Capital One Financial Corp., No. 24-cv-05985-TLT, 2025 WL 714252 (N.D. Cal. Mar. 3, 2025), and M.G. v. Therapymatch, Inc., No. 23-cv-04422-AMO, 2024 WL...more

Health Care Compliance Association (HCCA)

[Event] Healthcare Privacy Compliance Academy - June 9th - 12th, Pittsburgh, PA

HCCA's Healthcare Privacy Compliance Academy is a three-and-a-half-day interactive education program with a focus on the vast body of privacy laws and regulations in place to help you protect PHI and other critical data. Our...more

Robinson+Cole Data Privacy + Security Insider

AI Governance: Steps to Adopt an AI Governance Program

There are many factors to consider when assisting clients with assessing the use of artificial intelligence (AI) tools in an organization and developing and implementing an AI Governance Program. Although adopting an AI...more

Health Care Compliance Association (HCCA)

[Event] Healthcare Privacy Compliance Academy - March 24th - 27th, Chicago, IL

HCCA's Healthcare Privacy Compliance Academy is a three-and-a-half-day interactive education program with a focus on the vast body of privacy laws and regulations in place to help you protect PHI and other critical data. Our...more

Sands Anderson PC

Who’s Responsible When a Third-Party Vendor Is Compromised?

Sands Anderson PC on

Recently, we had the opportunity to advise some clients who worked with a third-party vendor that maintained custody of personal information pertaining to our clients’ respective end users.  The vendor suffered a data breach...more

Mitratech Holdings, Inc

Red Flags In Your Vendor’s Business Continuity Plan

Ensure your vendors are crisis-ready by recognizing these key indicators of weak continuity planning. The interconnected nature of modern business means that your vendors’ operational resilience can, and frequently does,...more

Lowenstein Sandler LLP

Top AI Risks General Counsels Should Address

Lowenstein Sandler LLP on

Considering the rapid development and deployment of artificial intelligence (AI) in a wide array of applications and business sectors, it can be a daunting task for a company’s General Counsel (GC) to keep pace in identifying...more

Venable LLP

Communicating in a Crisis: Tips for Protecting Communications When It Matters Most

Venable LLP on

As recent high-profile litigation, government investigations, and large-scale data-security incidents have shown, organizations are often thrust into crisis mode, requiring rapid responses and close collaboration with third...more

Foley & Lardner LLP

President Biden Issues Second Cybersecurity Executive Order

Foley & Lardner LLP on

In light of recent cyberattacks targeting the federal government and United States supply chains, President Biden’s administration has released an Executive Order (the “Order”) in an attempt to modernize and enhance the...more

Husch Blackwell LLP

Texas Files First Privacy Law Enforcement Action

Husch Blackwell LLP on

On January 13, 2025, Texas Attorney General’s Office filed its first lawsuit enforcing the Texas Data Privacy and Security Act (“TDPSA”). The law went into effect on July 1, 2024. The complaint also states claims under Texas’...more

Klein Moynihan Turco LLP

Federal Wiretapping Claims – The Next Frontier?

Readers of this blog may recall a recent favorable decision handed down by Massachusetts State’s highest court in which it found that Massachusetts Wiretap Act claims (“MWA”) do not extend to consumer interactions with...more

Ankura

Balancing Agility and Speed with Preparation and Stability: Importance of Governance in a Fintech Startup

Ankura on

In all our work with clients, my evaluation and expectations around compliance readiness come down to one point: Governance. This can mean a variety of things when it comes to a compliance program, but overall, we boil it...more

KPMG Board Leadership Center (BLC)

Oversight of data-related risks

Oversight of data-related risks: From data governance to GenAI and cybersecurity While data governance has been a priority for companies for some time, the explosive growth in the use of generative artificial intelligence...more

Health Care Compliance Association (HCCA)

BAAs: If and when third parties receiving PHI for research qualify as BAs under HIPAA

A business associate agreement (BAA) is a written contract between a covered entity (CE) and a business associate (BA) that—among other requirements—(1) establishes the permitted and required uses and disclosures of protected...more

Wiley Rein LLP

Litigation Grows Around Website Technologies, With Focus on Sensitive Data

Wiley Rein LLP on

Data privacy-related lawsuits have skyrocketed in recent years. Federal courts saw over 900 data privacy dockets in 2020 – but witnessed a surge to 1,767 dockets in 2023. At the halfway point in 2024, federal court data...more

K&L Gates LLP

Overview of the CFPB's Proposed Open Banking Rule and Final Industry Standard Setting Rule

K&L Gates LLP on

The financial services and banking industry landscape continues to evolve in the face of new and emerging technologies. This phenomenon is especially prevalent in the sharing of consumer data between financial institutions...more

Klein Moynihan Turco LLP

FTC Health Data Privacy Crackdown Continues

On April 11, 2024, Monument, Inc. (“Monument”), settled claims brought by the Federal Trade Commission (“FTC”) alleging that it had committed certain health data privacy law violations. Monument provides online addiction...more

NAVEX

Compliance & Cybersecurity – Working and Worrying Together About the Intersection of People and Technology

NAVEX on

I’m not a cyber expert, but as a compliance professional with accountability for internal investigations of employee and third-party misconduct I’ve had a front row seat to the evolution of risk that has mirrored the mass...more

101 Results
 / 
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide