News & Analysis as of

Regulatory Requirements Cybersecurity Data Protection

Mitratech Holdings, Inc

Third-Party Risk Management: The Definitive Guide

In a world with increasingly interconnected companies, vendors, suppliers, logistics partners, and cloud services providers, Third-Party Risk Management (TPRM) has advanced from being an annual checklist exercise to a...more

Ward and Smith, P.A.

Data Security and National Security: Are You the Weak Link?

Ward and Smith, P.A. on

International cybercrime is not new.  As a business owner in today's interconnected economy, you know all about the need to protect your technology, financial accounts, business operations, and customer data from digital...more

Lighthouse

M365 Academy: The Power of Sensitivity Labels in Microsoft 365

Lighthouse on

Read takeaways from our recent M365 Academy webinar on sensitivity labels, which covered how labels support governance across M365, from taxonomy design and classification to Copilot oversight, DLP, Insider Risk, and...more

Ice Miller

[Webinar] Cybersecurity Collaboration: Informing and Empowering the Defense Industrial Base - September 10th, 12:00 pm - 1:00 pm...

Ice Miller on

Join us for a timely and topical webinar hosted by Ice Miller, LLP, discussing cybersecurity collaboration and information sharing in the defense industrial base. The webinar also will feature a robust discussion of best...more

Troutman Pepper Locke

3 Takeaways From Recent Cyberattacks On Healthcare Cos.

Troutman Pepper Locke on

Significant data breaches have affected major players in the healthcare industry in the last year, with the methods of attack being as diverse as the affected entities themselves. Originally published in Law360 - June 4,...more

DLA Piper

Thailand: PDPA Crackdown 2025: Are You Next? – Major Fines and Lessons from Thailand’s Latest Enforcement

DLA Piper on

Since the full enforcement of Thailand’s Personal Data Protection Act B.E. 2562 (2019) (“PDPA”) in June 2022, the Personal Data Protection Committee (“PDPC”) has moved decisively from awareness-building to active enforcement....more

Hudson Cook, LLP

Massachusetts Data Breach Settlement: A Wake-Up Call for Rental Housing Operators

Hudson Cook, LLP on

On August 19, 2025, the Massachusetts Attorney General announced a $795,000 settlement with Peabody Properties, Inc., a Braintree, Massachusetts-based property management company, over serious failures in its handling of...more

Baker Donelson

Ten Key Insights from IBM's Cost of a Data Breach Report 2025

Baker Donelson on

IBM and the Ponemon Institute have released the 2025 Cost of a Data Breach Report. The report, which has become an annual late-summer tradition, highlights the evolving risks and costs associated with data breaches. This...more

Ankura

Navigating the DOJ's Final Rule on Bulk Sensitive Data Transactions: Data Security Program Insights and Compliance

Ankura on

On Feb. 28, 2024, President Biden issued Executive Order 14117, titled “Preventing Access to Americans' Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern.” This executive order...more

Osano

The Privacy Insider Podcast Episode 17: Security, Cyber-Intel, and a Sense of Humor with Nir Rothenberg of Rapyd

Osano on

Nir Rothenberg, Chief Information Security Officer of Rapyd, joins us to discuss why building resilient privacy and security frameworks is critical now as fintech companies face heightened scrutiny. With Rapyd expanding...more

Osano

The Data Privacy Certification Guide

Osano on

Unless businesses start hiring psychics, certifications will continue to be a critical way for experts to prove that they know what they're talking about. Whether you're looking to hire a privacy professional with the right...more

Coblentz Patch Duffy & Bass

Navigating the Shifting AI Landscape: What U.S. Businesses Need to Know in 2025

Artificial intelligence is no longer a wild west frontier technology—it’s a regulated one. As AI systems become central to how companies operate, communicate, and compete, legal oversight is catching up. In 2025, AI...more

Morris, Manning & Martin, LLP

Do you know what your AI is doing?

Imagine signing off on an update to your customer support portal and later discovering that an AI agent the development team added to the portal has been quietly sending snippets of support tickets to an unsecured LLM for...more

Morrison & Foerster LLP

From Policy to Practice: Nick Johnston on Navigating AI, Privacy, and Risk AI Wins, AI Fails - Part 1: Nick Johnston on What...

Welcome to the inaugural episode of PDS+, a new podcast series hosted by Morrison Foerster partners Kaylee Cox Bankston and Boris Segalis. The podcast is dedicated to exploring the intersection of privacy, cybersecurity, and...more

White & Case LLP

Cyber-attacks – What Does the Law Require?

White & Case LLP on

As major cyber-attacks continue to cause widespread organisational and economic disruption, and botnets are being discovered which have the capability of comprising entire organisations, many businesses are re-evaluating...more

Warner Norcross + Judd

Sixth Circuit Upholds FCC’s 2024 Data Breach Reporting Rules

Warner Norcross + Judd on

The U.S. Court of Appeals for the Sixth Circuit recently issued a decision in Ohio Telecom Association et al. v. FCC, upholding the FCC’s 2024 data breach reporting requirements for telecommunications carriers and relay...more

Parker Poe Adams & Bernstein LLP

Federal Trade Commission Finalizes Order With Web Hosting Company Over Data Security Failures

On May 21, 2025, the Federal Trade Commission (FTC) finalized a consent order with GoDaddy to settle allegations that the web hosting company misled customers and failed to implement basic data security protections. Although...more

Dacheng

China Monthly Data Protection Update: August 2025

Dacheng on

This monthly report outlines key developments in China’s data protection sector for August. The following events merit special attention: CAC Summons NVIDIA Over Cybersecurity Concerns Related to H20 Chip: On July 31, CAC...more

Secretariat

Five Key Recommendations to Strengthen Cybersecurity in Latin America and the Caribbean

Secretariat on

Cybersecurity is now a core element of legal, regulatory, and business risk management. In Latin America and the Caribbean, organizations face mounting pressure to demonstrate proactive compliance with evolving data...more

Warner Norcross + Judd

Avoid the October Surprise: What You Need to Know About DOJ’s New Data Security Program

Warner Norcross + Judd on

The Department of Justice’s (“DOJ”) Data Security Program (“the Program”, 28 C.F.R. Part 202) went into effect on April 8 with a 90-day period of limited enforcement. With DOJ now expecting full compliance, with additional...more

A&O Shearman

Mitigating third-party provider cybersecurity risks navigating the Australian legal framework

A&O Shearman on

Cybersecurity breaches originating from third-party providers (TPPs) are an escalating concern for Australian businesses. As supply chain risks grow, there is a mounting public expectation that the entity that commissioned...more

Herbert Smith Freehills Kramer

Independent Cybersecurity Audits Will Be Required for ‘Significant Risk’ Under CCPA

The California Privacy Protection Agency (CPPA) has unanimously adopted new regulations requiring certain businesses subject to the California Consumer Privacy Act (CCPA) to conduct annual audits of their cybersecurity...more

Troutman Pepper Locke

Analyzing the New CCPA Regulations

Troutman Pepper Locke on

At its July 24 board meeting, the California Privacy Protection Agency Board authorized agency staff to finalize regulations on automated decision-making technology, risk assessments, cybersecurity audits, insurance, and...more

Morrison & Foerster LLP

European Digital Compliance: Key Digital Regulation & Compliance Developments - August 2025

To help organizations stay on top of the main developments in European digital compliance, Morrison Foerster’s European Digital Regulatory Compliance team reports on some of the main topical digital regulatory and compliance...more

Gardner Law

Why Every Manufacturer Needs a Robust Information Security Program

Gardner Law on

Drug and device manufacturers are increasingly targeted by cyber threats that can compromise patient safety, intellectual property, and other critical data and systems, while also facing new regulatory demands. As regulators...more

296 Results
 / 
View per page
Page: of 12

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide