Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Part Two of a Two-Part Series
Part One of this series discussed security breach notification laws. The conclusion addresses security procedures laws.
In addition to the California security breach notification law, California was the first state to enact a security procedures law (A.B. 1950), which became effective Jan. 1, 2005. This law requires that a business implement and maintain reasonable security procedures and practices to protect personal information. A few other states, namely 1) Arkansas, 2) Nevada, 3) Rhode Island, and 4) Texas, also have enacted security procedures laws. In addition, Utah has passed such a law, which became effective Jan. 1, 2007. Again, for purposes of the utility of any overview, and because this California law also serves as the model for a number of the other state laws, a step-by-step analysis of this law is also set out here for consideration by landlords and managers.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
Chief information officers still bear the brunt of cybersecurity worries at many companies. But a study by the Association of Corporate Counsel Foundation finds that chief legal officers are increasingly taking a leadership role in cybersecurity strategy.
General counsel are eager to tap the promise of generative AI. But without clear technology road maps, many legal departments are struggling to turn that interest into action.
Part Two of this two-part article examines practical steps marketers must take to succeed in this changing landscape by embracing a multichannel, AI-driven approach to their marketing and PR efforts.
When the SEC issues the next annual enforcement report for fiscal year 2025, we expect securities offering actions and investment adviser actions will almost certainly be up, and the “crypto” and “cyber” cases will almost certainly be down. Public statements by the new SEC administration have said as much, but even more telling than public statements are the allocation of limited enforcement resources.
The VPPA may be nearly four-decades old and video-rental stores largely a thing of the past, but the rise of online content, streaming services and ancillary activities has brought with it frequent litigation based on the VPPA. The key challenge in these litigations is how to interpret the VPPA’s 1980s terms in light of today’s digital advances.