News & Analysis as of

FERPA Health Insurance Portability and Accountability Act (HIPAA) Cybersecurity

WilmerHale

State Comprehensive Privacy Law Update - March 2025

WilmerHale on

As the legislative season continues, some states, like Georgia and Oklahoma, have continued to progress in the efforts to establish a comprehensive data privacy law while others, such as Alabama, Illinois, and Massachusetts,...more

Jackson Lewis P.C.

Privacy Versus Cyber – What is the Bigger Risk?

Jackson Lewis P.C. on

“Cybersecurity” has emerged as one of top risks facing organizations. Considering the steady stream of massive data breaches affecting millions (sometimes billions), the debilitating effects of ransomware on an organization’s...more

Pierce Atwood LLP

Enforcement of U.S. Consumer Data Privacy Laws Part 1: Federal Agency Enforcement

Pierce Atwood LLP on

A threshold consideration for businesses trying to understand the actors that enforce U.S. consumer privacy laws is an analysis of which laws apply to that business. This is because U.S. consumer privacy laws exist as a...more

HaystackID

[Webcast Transcript] Today’s Privacy Reality: AI, Assessments, Breach and DSARs

HaystackID on

Editor’s Note: On February 15, 2023, HaystackID shared an educational webcast to provide valuable insight into the ways in which AI is being used to address key issues in the realm of privacy and cybersecurity. The expert...more

HaystackID

[Webcast Transcript] The State of US Privacy Law: What to Expect in 2023 and Beyond

HaystackID on

Editor’s Note: On September 29, 2022, HaystackID shared an educational webcast on the topic of US privacy law. As privacy continues to move to the forefront of not only information consideration but of business concern for...more

BakerHostetler

It’s Elementary: Measures that Educational Institutions Should Take to Prepare for Ransomware Attacks: Part 3

BakerHostetler on

In the event of a ransomware attack, there are a host of legal frameworks that could potentially be implicated. Whether those laws apply often depends on the nature of the data that the threat actor accessed and/or acquired....more

Epiq

Tips for Handling a Cyber Incident Review

Epiq on

A cyber security incident is a stressful and frightening event for an organization’s team. When it comes to putting cyber plans in place, organizations need to prepare for the worst-case scenario since it is no longer a...more

Polsinelli

Tech Transactions & Data Privacy 2021 Report

Polsinelli on

As we bid farewell to 2020 and look toward the uncharted territory of 2021, it is hard not to take inventory of all that has changed in such a short period. No one at the beginning of 2020 would have predicted what transpired...more

Sheppard Mullin Richter & Hampton LLP

2020 In Review: Ongoing Enforcement Actions and a Patchwork of Privacy Laws

Throughout 2020 we saw many enforcement actions brought by EU and U.S. regulators. Whether for allegations of deception (misleading privacy representations) or unfairness (failure to protect information), COVID did not appear...more

Health Care Compliance Association (HCCA)

Compliance Perspective: What's New in Healthcare Privacy

Recently the Health Care Compliance Association released the new Health Care Privacy Handbook, 3rd Edition. https://www.hcca-info.org/health-care-privacy-handbook To learn what’s new in the book and in healthcare privacy...more

Bricker Graydon LLP

Your data is under attack: Are you ready?

Bricker Graydon LLP on

On July 16, 2020, Blackbaud, a U.S. cloud software company and one of the world’s largest providers of financial and fundraising technology for nonprofit organizations and education institutions, notified its customers of a...more

White & Case LLP

COVID-19 and Data Protection Compliance in the US

White & Case LLP on

Irrespective of your industry, the current COVID-19 pandemic poses a new and unique challenge to organizations, their employees, and their customers. The emergence of COVID-19 has prompted organizations to collect and process...more

Jaburg Wilk

Everyone is Doing Business Online, and Most People are Doing it Wrong - 5 Practical Steps to Protect Your Customer Data

Jaburg Wilk on

Data breaches are inevitable. 2017 was the “year of the data breach,” with more exposure of personally identifiable information (“PII”) than ever before. If you were one of the 30% of US-based consumers who were notified of a...more

Steptoe & Johnson PLLC

The GDPR Becomes Effective This Month: Are You Ready?

On May 25, 2018, the European Union will begin enforcing the General Data Protection Regulation (GDPR), which enacts strict standards for the handling, retaining, and processing of the personal data of any individual located...more

Carlton Fields

Heal Thyself: Insider Threats to Heed, Especially for Industries with Large Amounts of Personal Information

Carlton Fields on

A recent study by the Ponemon Institute found that insider threats due to malicious or negligent employees are the leading cause of private-sector cybersecurity incidents. Of the over 600 information security professionals...more

Troutman Pepper

How to Avoid and Respond to a Cybersecurity Breach

Troutman Pepper on

In light of numerous recent data breaches, cybersecurity has emerged as an issue impacting organizations ranging from the local hardware store to the largest multi-national firms in the world. In short, no industry is immune...more

16 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide