News & Analysis as of

Encryption

HaystackID

Safeguarding the Corporate Network Against Breaches through Information Governance

HaystackID on

While corporate leaders often view cybersecurity as a technical challenge, contributing author Phil Favro illustrates the legal and organizational dimensions of cybersecurity in this recent article. Favro emphasizes that...more

Skadden, Arps, Slate, Meagher & Flom LLP

FTC Chair Warns Tech Firms: Weakening Encryption or Censoring Americans for Foreign Governments May Violate US Law

The FTC’s letters highlight the commission’s concern that tech companies may adopt content moderation or data security policies that, while designed to meet foreign legal requirements, could impermissibly infringe upon U.S....more

Hanzo

Compliance Under Pressure: Audit Readiness for Healthcare Providers

Hanzo on

In today’s healthcare environment, compliance is a defining element of patient care quality, operational integrity, and public trust. Oversight from agencies such as the Office for Civil Rights (OCR), the Centers for Medicare...more

Alston & Bird

Rhode Island’s New Cybersecurity Law for Nonbank Financial Institutions

Alston & Bird on

Rhode Island has enacted Senate Bill 603 (SB603), effective July 2, 2025, establishing a comprehensive cybersecurity framework for nonbank financial institutions licensed by the state’s Department of Business Regulation...more

Morgan Lewis - Tech & Sourcing

Navigating the UK’s Online Safety Act: Implications for Global Digital Services

The United Kingdom’s Online Safety Act (OSA or the Act), which received Royal Assent in October 2023, establishes a new statutory framework to address harmful online content, protect children, and promote accountability among...more

Osano

Data Privacy Strategy: The Complete Compliance Guide

Osano on

Organizations often struggle with privacy in a regulatory landscape that can change at any point. However, the risk of data breaches is always rising, and awareness of privacy rights is growing. As a result, maintaining the...more

Downs Rachlin Martin PLLC

Protecting Your Team's Data: What Every Employer Needs to Know

Let’s talk about something that doesn’t get enough attention: protecting your employees’ sensitive personal information. In today’s digital world, keeping your team’s data safe isn’t just a nice-to-have—it’s absolutely...more

EDRM - Electronic Discovery Reference Model

[Webinar] Mastering the Data Frontier: A Galactic Guide to Streamlining your eDiscovery - July 23rd, 1:00 pm - 2:00 pm ET

Join masters Andy Jacobs and Josh Hickman of Cellebrite Enterprise Solutions as they lead you through the galaxy of modern enterprise data collection and analysis across the EDRM lifecycle. From the moment a case is activated...more

StoneTurn

Assessing the Iranian Cyber Arsenal: Post “12 Day War” Threat to Your Company

StoneTurn on

As tensions flare in the Middle East, speculation is growing over the potential impacts of Iranian cyberattacks targeting US based companies and infrastructure. We saw similar reactions in 2020 following the death of the head...more

McCarter & English Blog: Government Contracts...

Building the Cyber Fortress: New Cybersecurity Executive Order Targets Quantum, AI, and Supply Chain Security

On June 6, 2025, President Trump issued a new executive order, “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144” (EO), signaling the construction...more

Jenner & Block

Client Alert: White House Narrows and Refocuses Biden Executive Order on Strengthening Federal Cybersecurity

Jenner & Block on

On June 6, 2025, President Donald J. Trump signed a new executive order on “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144” (“Trump Cyber EO”),...more

Bradley Arant Boult Cummings LLP

A Practical Guide to Understanding Quantum Computing’s Potential Threat to Encryption

Encryption is one of several cornerstones of a robust information security program. Articles on quantum computing often include the compelling narrative that encryption is at risk, but as with any revolutionary technology,...more

Fisher Phillips

Protecting Data While Traveling Internationally: An Employer’s Guide for Foreign Nationals and Other Global-Traveling Workers

Fisher Phillips on

International travel may pose serious data security risks – especially for your foreign national workers carrying sensitive, proprietary, or regulated information. Travelers must be aware of potential border inspections,...more

Hogan Lovells

End-to-end encryption: obstacle or pillar of national security?

Hogan Lovells on

In the face of rising cybercrime, end-to-end encryption has become a point of tension between the protection of secrets, public security, and technological sovereignty. At stake: preserving encryption as a safeguard for...more

Pillsbury - Internet & Social Media Law Blog

Why Your Organization Should Be Thinking About Quantum Computing and the Future of Encryption

Quantum computing (QC) is poised to disrupt cybersecurity in ways that business leaders and legal professionals cannot afford to ignore. But what exactly is quantum computing, why does it pose such a significant threat to...more

U.S. Legal Support

Security Best Practices for Remote Depositions in the Digital Age

U.S. Legal Support on

Trial outcomes often hinge on witness testimony. Attorneys collect much of this testimony during a formal process called a deposition. A critical component of discovery, depositions traditionally occur in law offices or...more

Holland & Hart LLP

E-mailing and Texting PHI: Beware HIPAA

Holland & Hart LLP on

The HIPAA Privacy and Security Rules require covered entities (including healthcare providers and health plans) and their business associates to protect patient information stored or transmitted electronically, including...more

American Conference Institute (ACI)

[Event] 15th Forum on Global Encryption, AI, Cloud & Cyber Export Controls - March 26th - 27th, San Francisco, CA

As global trade policy evolves faster than ever, now is the time to connect with your peers, discover new strategies, and most importantly, hear from the regulatory agencies on the front lines of policy change. ACI’s 15th...more

Osano

The Privacy Insider Podcast Episode 11: Signal and Noise: The New Administration, Privacy, and Our Digital Rights with Cindy Cohn...

Osano on

Digital rights, privacy, and government policies have been a hot topic over the past month as the Trump Administration comes on board. But the truth is, data protection and safeguarding our freedoms are not partisan issues....more

HaystackID

The Great Encryption Standoff: Apple vs. the UK’s Surveillance Push

HaystackID on

In the quiet corridors of Apple’s headquarters, executives face a decision that could reshape the future of digital privacy for billions of users worldwide. The catalyst? A controversial order from the United Kingdom’s...more

ArentFox Schiff

Proposed Changes to the HIPAA Security Rule: What Regulated Entities Need to Know

ArentFox Schiff on

In the final days of the Biden Administration, the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) issued a notice of proposed rulemaking (NPRM) to modify the Security Rule under the Health...more

Maynard Nexsen

Changes Proposed by HHS to Strengthen HIPAA Security Rule

Maynard Nexsen on

On January 6, 2025, the US Department of Health and Human Services Office for Civil Rights (“OCR”) issued a notice of proposed rulemaking (“Proposed Rule”) containing significant updates to the Security Rule under the Health...more

MG+M The Law Firm

Revocation of Executive Order 14110—Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence: Relevance to...

MG+M The Law Firm on

On January 20, 2025, President Trump revoked Executive Order (EO) 14110—Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence, issued on October 30, 2023. EO 14110 was promulgated as a coordinated...more

Foley & Lardner LLP

Cybersecurity Executive Order—Key Implications for the Manufacturing Industry

Foley & Lardner LLP on

On January 16, 2025, President Joe Biden issued the “Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity,” a comprehensive directive designed to address the growing complexity and...more

King & Spalding

Biden Administration’s Eleventh-Hour Executive Order Imposes New Software Requirements on Companies

King & Spalding on

On January 16, 2025, President Biden issued Executive Order 14144 on Strengthening and Promoting Innovation in the Nation’s Cybersecurity (the “EO”). Building on prior initiatives such as Executive Order 14028 and the...more

538 Results
 / 
View per page
Page: of 22

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide