A new report from the law firm of Pinsent Masons shows that there has been a high level of GDPR "over-reporting" at the U.K.'s Information Commissioner's Office, but organizations who may think they are playing it safe may actually be opening themselves up to further regulatory scrutiny.
- July 01, 2019Frank Ready
To comply with the data side of the Outside Counsel Guidelines, firms must have a clear information governance strategy for which the firm's use of technology systems is foundational.
June 01, 2019Stephen ColeThe European Union has put forth an ambitious proposal for how countries can eliminate barriers to e-commerce and protect businesses and consumers engaged in online transactions. But parts of the proposal, published as part of a World Trade Organization initiative that includes the U.S. and China, are likely to face opposition.
June 01, 2019Simon TaylorNew Study Shows U.S. Companies Are Taking the Same Failed Approach To Complying With California's Privacy Regulation As They Did for GDPR
U.S. companies haven't learned much from the missteps they made while preparing for the European Union's General Data Protection Regulation (GDPR), suggests a new study on data privacy regulation compliance.
June 01, 2019Phillip BantzLegislation expanding the types of personal data that will trigger a required notification to customers in case of a breach, including email addresses and passwords, was signed into law by Gov. Phil Murphy.
June 01, 2019Suzette ParmleyThis article discusses what to look for in a cloud service provider and other issues that will help determine if moving to the cloud is the right move for your firm.
May 01, 2019Michael Smith and Mike PaulConsistent With the Cliché That “Everything's Bigger In Texas,” the Texas Legislature Has Introduced Not One, But Two Separate Bills Relating to the Privacy of Personal Information
The TPPA is arguably the less onerous of the two bills, although you might not necessarily realize it at first blush, given the broad way it defines “personal identifying information” (PII).
May 01, 2019Eric LevyEffective cybersecurity requires an ongoing, risk-based, comprehensive process that addresses people, policies and procedures, and technology, including training. Effective security also requires an understanding that security is everyone's responsibility and constant security awareness by all users of technology.
May 01, 2019David G. RiesThe CCPA is the first of its kind, generally applicable data protection law in the United States. What makes the CCPA unique is not only its applicability to companies like those in the entertainment and media industries, but also the rights it provides to consumers regarding their personal information (PI).
May 01, 2019Samuel Cullari and Alexis CoccoApart from headline grabbing attacks, we are now seeing an epidemic of cyber attacks. Concern has shifted from dealing with data being stolen and sold on the dark Web to handling serious ransomware and destructive attacks, where attackers are looking for immediate monetary output.
April 01, 2019Ankur Sheth and Jano Bermudes











