News & Analysis as of

Third-Party Data Protection

Mitratech Holdings, Inc

Third-Party Risk Management: The Definitive Guide

In a world with increasingly interconnected companies, vendors, suppliers, logistics partners, and cloud services providers, Third-Party Risk Management (TPRM) has advanced from being an annual checklist exercise to a...more

McDermott Will & Schulte

Major ECJ decision confirms when data may be anonymous in the hands of third parties

On 4 September, the ECJ handed down a major and eagerly awaited decision on the scope of personal data, accepting the point that pseudonymised data may be anonymised in the hands of a third party. The ECJ’s approach is...more

Hanzo

Compliance Under Pressure: Audit Readiness for Healthcare Providers

Hanzo on

In today’s healthcare environment, compliance is a defining element of patient care quality, operational integrity, and public trust. Oversight from agencies such as the Office for Civil Rights (OCR), the Centers for Medicare...more

Hudson Cook, LLP

Important Compliance Notes on CCPA

Hudson Cook, LLP on

August 29, 2025 Megan Nicholls On July 1, 2025, California Attorney General Rob Bonta announced a breathtaking $1.55 million settlement with the operator of a health and wellness information website. The operator is alleged...more

Coblentz Patch Duffy & Bass

Updates to Children's Privacy Federal and State Laws

Over the past year, the Federal Trade Commission (FTC) has implemented significant updates to the Children’s Online Privacy Protection Act (COPPA) Rule meant to strengthen key protections for children’s privacy online. COPPA...more

Warner Norcross + Judd

Avoid the October Surprise: What You Need to Know About DOJ’s New Data Security Program

Warner Norcross + Judd on

The Department of Justice’s (“DOJ”) Data Security Program (“the Program”, 28 C.F.R. Part 202) went into effect on April 8 with a 90-day period of limited enforcement. With DOJ now expecting full compliance, with additional...more

Ankura

Engineering Confidence: 14 Critical Questions for Secure LLM and RAG Deployment

Ankura on

The rapid evolution of large language models (LLMs), retrieval-augmented generation (RAG), and Model Protocol Context (MCP) implementation has led many developers and teams to quickly adopt and integrate these powerful...more

A&O Shearman

Mitigating third-party provider cybersecurity risks navigating the Australian legal framework

A&O Shearman on

Cybersecurity breaches originating from third-party providers (TPPs) are an escalating concern for Australian businesses. As supply chain risks grow, there is a mounting public expectation that the entity that commissioned...more

Jones Day

Brand Protection and Enforcement Under the DSA: Opportunities and Challenges

Jones Day on

The Digital Services Act ("DSA"), which entered into force for all intermediary services and online platforms in February 2024, aims to modernize and harmonize the regulation of third-party content across the EU. It notably...more

Ropes & Gray LLP

Pixel Litigation Risk at Financial Institutions

Ropes & Gray LLP on

An increasingly aggressive plaintiffs’ bar has brought purported class action suits based on the nearly ubiquitous use of tracking technologies used for website analytics. Although any actual harm to the plaintiffs is...more

Seyfarth Shaw LLP

CPPA Underscores That Businesses Own CCPA Compliance – Even When Privacy Management Tools Fail

Seyfarth Shaw LLP on

The California Privacy Protection Agency (“CPPA”) has made it abundantly clear: privacy compliance isn’t just about publishing the right disclosures – it’s about whether your systems actually work. On May 6, the agency fined...more

Klein Moynihan Turco LLP

CIPA Claims and GET Requests

While readers of this blog are familiar with the proliferation of California Invasion of Privacy Act (“CIPA”) wiretapping claims, our readers may be less familiar with CIPA-related GET Request claims. Below, we explain what...more

Vedder Price

FINRA Publishes 2025 Regulatory Oversight Report

Vedder Price on

On January 28, 2025, FINRA published its annual regulatory oversight report for 2025 (Report), which highlights observations and findings from FINRA’s oversight programs. The Report covers 24 topics, and for each topic it...more

Sands Anderson PC

Who’s Responsible When a Third-Party Vendor Is Compromised?

Sands Anderson PC on

Recently, we had the opportunity to advise some clients who worked with a third-party vendor that maintained custody of personal information pertaining to our clients’ respective end users.  The vendor suffered a data breach...more

Clark Hill PLC

The Growing Cybersecurity Risks in the Cannabis Industry

Clark Hill PLC on

Those familiar with the industry know that cannabis retailers find themselves in a unique position compared to other product retailers. Cannabis retailers face significant regulatory hurdles to their operation—particularly in...more

Lowenstein Sandler LLP

Top AI Risks General Counsels Should Address

Lowenstein Sandler LLP on

Considering the rapid development and deployment of artificial intelligence (AI) in a wide array of applications and business sectors, it can be a daunting task for a company’s General Counsel (GC) to keep pace in identifying...more

Maynard Nexsen

Tri-Agency FAQ Provides Updated Guidance Regarding Compliance with the Gag Clause Prohibition

Maynard Nexsen on

On January 14, 2024, the Departments of Labor, Health and Human Services, and the Office of Personnel Management (the “Departments”) jointly released the FAQs About Consolidated Appropriations Act, 2021 Implementation Part 69...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #430 – GrubHub Confirms Security Incident Through Third Party Vendor

If you are a GrubHub customer, read carefully. The app has confirmed a security incident involving a third-party vendor that allowed an unauthorized threat actor to access user contact information, including some customer...more

Venable LLP

Communicating in a Crisis: Tips for Protecting Communications When It Matters Most

Venable LLP on

As recent high-profile litigation, government investigations, and large-scale data-security incidents have shown, organizations are often thrust into crisis mode, requiring rapid responses and close collaboration with third...more

Sheppard Mullin Richter & Hampton LLP

Looking Beyond FedRAMP – Lessons from the U.S. Treasury Cybersecurity Incident

In the ever-evolving world of cybersecurity, even organizations that meet stringent security standards can be victims of sophisticated cyberattacks. A notable example of this is the December 8, 2024 cybersecurity incident...more

K&L Gates LLP

Managing Artificial Intelligence: The Monetary Authority of Singapore's Recommendations on AI Model Risk Management

K&L Gates LLP on

Introduction and Background - On 5 December 2024, as part of the Monetary Authority of Singapore’s (MAS) incremental efforts to ensure responsible use of artificial intelligence (AI) in Singapore’s financial sector, MAS...more

Conn Kavanaugh

Three Things You Should Know About Service Level Agreements in SaaS/Cloud Contracts

Conn Kavanaugh on

When a customer purchases software-as-a-service (SaaS)–which is sometimes called a “cloud” service or product–the software is not hosted. It does not reside at the customer’s location or data center. Rather the software is...more

Cozen O'Connor

Missouri to Require Social Media Companies to Offer Algorithmic Choice

Cozen O'Connor on

Missouri AG Andrew Bailey is issuing a regulation requiring social media companies to offer algorithmic choice for users in the state. Under the rule, it will be an unfair, deceptive, or fraudulent practice under the Missouri...more

Klein Moynihan Turco LLP

Can’t Teach An Old Dog New CIPA Claim Tricks

Despite some favorable rulings, lawsuits alleging California Invasion of Privacy Act (“CIPA”) claims against companies that use third-party tracking technology to collect consumer data on their websites show no signs of...more

Constangy, Brooks, Smith & Prophete, LLP

Litigation under New Jersey’s “Daniel’s Law”

The New Jersey privacy statute – “Daniel’s Law” – has been in full effect for only a little more than a year now, but New Jersey courts have already been inundated with a wave of lawsuits. In February 2024 alone, more than...more

120 Results
 / 
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide