News & Analysis as of

Regulatory Requirements Data Protection Third-Party

Mitratech Holdings, Inc

Third-Party Risk Management: The Definitive Guide

In a world with increasingly interconnected companies, vendors, suppliers, logistics partners, and cloud services providers, Third-Party Risk Management (TPRM) has advanced from being an annual checklist exercise to a...more

Coblentz Patch Duffy & Bass

Updates to Children's Privacy Federal and State Laws

Over the past year, the Federal Trade Commission (FTC) has implemented significant updates to the Children’s Online Privacy Protection Act (COPPA) Rule meant to strengthen key protections for children’s privacy online. COPPA...more

Warner Norcross + Judd

Avoid the October Surprise: What You Need to Know About DOJ’s New Data Security Program

Warner Norcross + Judd on

The Department of Justice’s (“DOJ”) Data Security Program (“the Program”, 28 C.F.R. Part 202) went into effect on April 8 with a 90-day period of limited enforcement. With DOJ now expecting full compliance, with additional...more

A&O Shearman

Mitigating third-party provider cybersecurity risks navigating the Australian legal framework

A&O Shearman on

Cybersecurity breaches originating from third-party providers (TPPs) are an escalating concern for Australian businesses. As supply chain risks grow, there is a mounting public expectation that the entity that commissioned...more

Seyfarth Shaw LLP

CPPA Underscores That Businesses Own CCPA Compliance – Even When Privacy Management Tools Fail

Seyfarth Shaw LLP on

The California Privacy Protection Agency (“CPPA”) has made it abundantly clear: privacy compliance isn’t just about publishing the right disclosures – it’s about whether your systems actually work. On May 6, the agency fined...more

Sands Anderson PC

Who’s Responsible When a Third-Party Vendor Is Compromised?

Sands Anderson PC on

Recently, we had the opportunity to advise some clients who worked with a third-party vendor that maintained custody of personal information pertaining to our clients’ respective end users.  The vendor suffered a data breach...more

Clark Hill PLC

The Growing Cybersecurity Risks in the Cannabis Industry

Clark Hill PLC on

Those familiar with the industry know that cannabis retailers find themselves in a unique position compared to other product retailers. Cannabis retailers face significant regulatory hurdles to their operation—particularly in...more

Lowenstein Sandler LLP

Top AI Risks General Counsels Should Address

Lowenstein Sandler LLP on

Considering the rapid development and deployment of artificial intelligence (AI) in a wide array of applications and business sectors, it can be a daunting task for a company’s General Counsel (GC) to keep pace in identifying...more

Maynard Nexsen

Tri-Agency FAQ Provides Updated Guidance Regarding Compliance with the Gag Clause Prohibition

Maynard Nexsen on

On January 14, 2024, the Departments of Labor, Health and Human Services, and the Office of Personnel Management (the “Departments”) jointly released the FAQs About Consolidated Appropriations Act, 2021 Implementation Part 69...more

Cozen O'Connor

Missouri to Require Social Media Companies to Offer Algorithmic Choice

Cozen O'Connor on

Missouri AG Andrew Bailey is issuing a regulation requiring social media companies to offer algorithmic choice for users in the state. Under the rule, it will be an unfair, deceptive, or fraudulent practice under the Missouri...more

J.S. Held

Top 4 Cybersecurity Headaches Plaguing Financial Services Institutions

J.S. Held on

Most Financial Services Institutions (FSIs) have digital technology at their core. And a primary responsibility for most FSIs is “cyber-connect” customers – be they organizations or individuals – with their money simply and...more

Bricker Graydon LLP

FTC announces new and improved data security guidance

Bricker Graydon LLP on

On January 6, 2020, Andrew Smith, Director of the Federal Trade Commission (FTC) Bureau of Consumer Protection, announced three significant improvements to the FTC’s approach to data security enforcement cases....more

12 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide