• Search for " " on Law Report Group

    HOME

    TOPICS

    ABOUT US

  • |
  • Home
  • Topics A-Z
  • Regulations & Enforcement
  • Data Security
  • Data Privacy
  • In-House Essentials
  • Checklists
  • About Us
  • Subscribe

Data Privacy

  • Litigation
  • Compliance
  • Connected Devices

Apr. 23, 2025

Sale of 23andMe’s Genetic Data: Lessons for Companies Around Sensitive Data

Apr. 16, 2025

Sale of 23andMe’s Genetic Data: Implications of the Motions for a Privacy Ombudsman and State Laws

Mar. 12, 2025

Managing Tracking Technologies and Their Privacy Dilemmas in 2025

Jan. 22, 2025

How Internal Investigations Can Let the Compliance Team Shine

Jan. 22, 2025

Fifty-Three Regulators Raise Cyber Expectations With Multi-State Breach Settlement

Dec. 18, 2024

Advertising Opt‑Outs Drive New Privacy Strategies in 2025

Nov. 27, 2024

Lessons From the Trenches: Winning Strategies for Defeating Pen Register Lawsuits

Nov. 27, 2024

Google’s Wiretap Cases Highlight Evolving Privacy Transparency Standards

Nov. 13, 2024

Unpacking the Second Circuit’s Bombshell VPPA Ruling

Nov. 6, 2024

Seventh Circuit Refuses to Compel BIPA Mass Arbitration Against Samsung: Takeaways and Lessons

Oct. 30, 2024

Seventh Circuit Refuses to Compel BIPA Mass Arbitration Against Samsung: Legal Analysis Breakdown

Oct. 23, 2024

Aftermath of the Ninth Circuit BIPA Liability Shake‑Up in Zellmer v. Meta

Aug. 14, 2024

Considerations for Adtech Stemming From Oracle’s $115‑Million Settlement

Jun. 12, 2024

Lessons From the Trenches: Winning Strategies for Defeating Pen Register Lawsuits

Apr. 17, 2024

Tracking Technologies: Compliance Challenges and Solutions

Apr. 3, 2024

Addressing the Operational Complexities of Complying With the Washington My Health My Data Act

Mar. 20, 2024

Court Hands FTC Grounds to Curb Data Broker Sales

Feb. 28, 2024

Legal and Ethical Issues in Use of Biometrics: FIDO, Identity-Proofing and Other Options

Feb. 21, 2024

Legal and Ethical Issues in Use of Biometrics: Modality Selection, Implementation and State Laws

Feb. 7, 2024

Progress? Recent Rulings Are One Step Forward, Two Steps Back for BIPA Defendants

Feb. 7, 2024

Avoiding Pitfalls in Cyber Insurance Applications and Claims

Jan. 24, 2024

Google’s Wiretap Cases Highlight Evolving Privacy Transparency Standards

Jan. 17, 2024

Tracking Technologies: Privacy Regulation, Enforcement and Risk

Dec. 13, 2023

Navigating a Breach As a Third-Party Service Provider: Notifications, Network Decisions and Preserving Privilege

Oct. 25, 2023

Private Actions Under the CPRA: Settlement Considerations and Mitigating Risk

Oct. 18, 2023

Private Actions Under the CPRA: Key Issues and Defense Strategies

Oct. 11, 2023

Former SEC Officials Discuss Aggressive Enforcement Climate

Oct. 4, 2023

Understanding the Fiduciary Exception to Attorney-Client Privilege

Sep. 13, 2023

Examining the Washington Attorney General’s FAQs on the My Health My Data Act

Aug. 2, 2023

Navigating Evolving Data Breach Litigation and Regulatory Risks

Jun. 21, 2023

Xbox and Alexa COPPA Case Lessons: Avatars, Biometrics and Other New Expectations

Jun. 14, 2023

Xbox and Alexa COPPA Case Lessons: Negotiating With the FTC Over Algorithms and Remedies

May 10, 2023

Aggressive Washington Health Privacy Law: Ten Compliance Priorities

May 3, 2023

Aggressive Washington Privacy Law: Right to Sue and Onerous Consent Obligations

Apr. 26, 2023

Tips for Working With Cyber Insurance Carriers Following a Ransomware Event

Apr. 5, 2023

Website-Tracking Lawsuits: Takeaways From New Dismissals of Wiretap Claims

Mar. 29, 2023

Website-Tracking Lawsuits: A Guide to New Video Privacy Decisions Starring PBS and People.com

Mar. 22, 2023

ECJ Ruling Expands Legal Professional Privilege

Mar. 8, 2023

BIPA Decisions Expand Potential Liability: What’s Next in Illinois and Other States?

Jan. 11, 2023

Something’s Gotta Give: Navigating Auditor Inquiries in Investigations (Part Two of Two)

Jan. 4, 2023

Something’s Gotta Give: Navigating Auditor Inquiries in Investigations (Part One of Two)

Dec. 7, 2022

Checklist for Preserving Privilege of Forensic Analyses Post Breach

Nov. 23, 2022

2) Looking Back on the Breach: Fundamentals of Preserving Privilege of Forensic Analyses in the Wake of a Data Breach

Oct. 26, 2022

Navigating the Interplay of Breach Response and Breach Notification

Sep. 14, 2022

Shaping the BIPA Landscape: Avoiding Liability

Sep. 07, 2022

Shaping the BIPA Landscape: Notable Trends and Developments

Aug. 10, 2022

Tips for How In-House Counsel Can Navigate Typical Ethical Dilemmas and Conflicts of Interest (Part Two of Two)

Aug. 3, 2022

Importance of In-House Counsel Discerning Their Client and Managing Evolving Attorney-Client Privilege Issues (Part One of Two)

Jul. 20, 2022

Looking Back on the Breach: Fundamentals of Preserving Privilege of Forensic Analyses in the Wake of a Data Breach

Jun. 29, 2022

Lessons From CISA for In-House Counsel on Mitigating and Managing MSP Breach Threats

Mar. 16, 2022

No End in Sight: Biometrics Litigation Trends

Feb. 2, 2022

Compliance Takeaways From the Latest GDPR Enforcement Statistics

Jan. 19, 2022

Privacy Resolutions for 2022

Oct. 20, 2021

Collective Actions in the U.K. After Lloyd v. Google

Sep. 22, 2021

Examining the Intersection of Voiceprints and Data Privacy Laws

Jul. 28, 2021

Will Supreme Court’s New Standing Test Tame the Real World of Class Actions?

Jun. 9, 2021

To “Cure” or Not to “Cure,” That Is the Question

Mar. 3, 2021

Six Ways to Address Privacy Concerns in Biometric Vendor Contracts

Mar. 3, 2021

Preserving the Privilege for In-House Counsel: Internal Investigations and Depositions

Feb. 24, 2021

Conduct Remedies: The Undervalued Element of Cybersecurity and Privacy Class Actions

Feb. 24, 2021

Preserving the Privilege for In-House Counsel: Communications and Common Issues

Feb. 17, 2021

Big Questions for BIPA Case Law in 2021

Feb. 3, 2021

Expect Continuing Regulatory Focus on Cybersecurity and Data Protection in 2021

Jan. 27, 2021

Steps to Protect Privilege for Data Breach Forensic Reports

Dec. 2, 2020

Facebook Wiretap Ruling Inspires Slew of Lawsuits Over Consumer Tracking

Nov. 4, 2020

Comparing U.S. and E.U. Approaches to Incident Response and Breach Notification

Oct. 14, 2020

Top Priorities for Compliance With Brazil’s New Personal Data Protection Law

Sep. 23, 2020

Data Breaches, Leaked Documents and the Attorney-Client Privilege: Can the Bell Really Be Unrung?

Aug. 19, 2020

After Capital One Ruling, How Will Companies Protect Forensic Reports?

Jul. 15, 2020

Google Decision Opens the Door for American-Style Class Action in U.K.: Six Ways to Avoid Liability

Jul. 8, 2020

Google Decision Opens the Door for American-Style Class Action in U.K.: Analyzing What Constitutes Harm

Jun. 10, 2020

After Capital One Ruling, How Will Companies Protect Forensic Reports?

Jun. 3, 2020

Preserving Privilege in Audits and Internal Investigations

May 6, 2020

Managing Ransomware’s Mutation Into a Public Data Breach

Apr. 29, 2020

What Is the Potential Liability for Zoombombing, and How Safe Are Zoom Alternatives?

Oct. 30, 2019

Broad but Limited Reach of GDPR Highlighted in ECJ Google Ruling on “Right to Be Forgotten”

Sep. 18, 2019

Strategies and Tactics for Developing an Effective Tabletop Exercise (Part One of Two)

Aug. 7, 2019

Lessons From SDNY Ruling on How to Preserve Privileged Communications With Attorney Consultants

Jul. 3, 2019

Reducing Risk in the Dawn of Equifax and Other Cyber Related Securities Fraud Class Actions

Apr. 3, 2019

Combatting Privacy Issues Arising From Geolocation Data Use: Understanding the Legal Landscape

Mar. 27, 2019

Navigating the Risks of Alternative Data Collection and Use

Mar. 20, 2019

Increased Post-Breach Discovery Turns Spotlight on Privilege

Feb. 27, 2019

Preserving Privilege in Communications Involving In-House Counsel

Feb. 13, 2019

Reducing Risk in the Dawn of Equifax and Other Cyber-Related Securities Fraud Class Actions

Jan. 23, 2019

Illinois Federal Court Denies Standing in BIPA Claim Against Google

Dec. 12, 2018

Illinois Appellate Decision Creates Split on Standing to Sue Under BIPA

Dec. 5, 2018

Answers to Four Critical Questions on Privilege in Internal Investigations

Sep. 19, 2018

Ohio Adopts Pioneering Cybersecurity Safe Harbor for Companies

May 9, 2018

The Right to Be Forgotten: English High Court Details When Google Must Delist Links to Crimes

May 2, 2018

Lessons on Litigation Privilege in Internal Investigations from the U.K.’s Bilta v. Royal Bank of Scotland Case

Feb. 14, 2018

NY AG and HHS Flex Regulatory Muscles in Recent Protected Health Information Breach Settlements

Feb. 14, 2018

Dynamic Regulations and Shareholder Actions Guide the Board’s Shifting Role in Cyber (Part Two of Two)

Jan. 31, 2018

Biometric Data Protection Laws and Litigation Strategies (Part One of Two)

Jan. 31, 2018

Dynamic Regulations and Shareholder Actions Guide the Board’s Shifting Role in Cyber (Part One of Two)

Dec. 6, 2017

Actions Under Biometric Privacy Laws Highlight Related Risks

Oct. 11, 2017

Reconciling Data Localization Laws and the Global Flow of Information

Sep. 27, 2017

New Criteria for Employee Monitoring Practices in Light of ECHR Decision

Sep. 13, 2017

Dispelling Myths About When Attorney-Client Privilege Applies to Communications With In-House Counsel

Aug. 3, 2016

Six State Secrets and Data Privacy Considerations in Chinese Internal Investigations 

Dec. 9, 2015

Proactive Steps to Protect Your Company in Anticipation of Future Data Security Litigation (Part Two of Two)

Jul. 29, 2015

Analyzing and Complying with Cyber Law from Different Vantage Points (Part Two of Two)

May 31, 2017

Reacting Quickly With a Nimble Incident Response Plan

Apr. 19, 2017

How to Walk the Tightrope of Cooperation and Privilege When Facing Government Investigations and Parallel Litigation

Mar. 8, 2017

Defense and Plaintiff Perspectives on How to Survive Data Privacy Collateral Litigation

Mar. 8, 2017

Protecting Attorney-Client Privilege and Attorney Work Product While Cooperating With the Government: Implications for Collateral Litigation (Part Three of Three)

Feb. 22, 2017

Protecting Attorney-Client Privilege and Attorney Work Product While Cooperating with the Government: Strategies to Minimize Risks During Cooperation (Part Two of Three)

Feb. 8, 2017

Third and Seventh Circuits Shed New Light on Spokeo Standing Analysis

Feb. 8, 2017

Protecting Attorney-Client Privilege and Attorney Work Product While Cooperating With the Government: Establishing Privilege and Work Product in an Investigation (Part One of Three)

Nov. 30, 2016

Attorney-Consultant Privilege? Structuring and Implementing the Kovel Arrangement (Part Two of Two)

Nov. 16, 2016

Attorney-Consultant Privilege? Key Considerations for Invoking the Kovel Doctrine (Part One of Two)

Sep. 7, 2016

Lessons From Consumer Challenges to Email Review Practices

Jun. 22, 2016

How to Avoid Common Mistakes and Manage the First 48 Hours Post-Breach

Jun. 8, 2016

Minimizing Class Action Risk in Breach Response

Jun. 8, 2016

Eight Attributes In-House Counsel Look For in Outside Cybersecurity Counsel

May 25, 2016

Foreign Attorneys Share Insight on Data Privacy and Privilege in Multinational Investigations

May 25, 2016

Spokeo’s Impact on Data Breach Cases: The Class Action Floodgates Have Not Been Opened, But the Door Has Not Been Locked

May 11, 2016

When Do Consumers Have Standing to Sue Over Data Breaches?

Apr. 27, 2016

Federal Judge Offers Advice on Litigating Data Privacy, Security Breach and TCPA Class Action Suits

Apr. 27, 2016

A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: From Data Mapping to Evaluation (Part One of Three)

Mar. 30, 2016

In-House and Outside Counsel Offer Strategies for Navigating the TCPA, Avoiding Litigation and Responding to Breaches

Mar. 30, 2016

Making Sense of Conflicting Standing Decisions in Data Breach Cases

Feb. 3, 2016

Germany Eases Restrictions on Certain Privacy Class Actions

Nov. 25, 2015

Proactive Steps to Protect Your Company in Anticipation of Future Data Security Litigation (Part One of Two)

Nov. 11, 2015

Target Privilege Decision Delivers Guidance for Post-Data Breach Internal Investigations

Nov. 11, 2015

California Law Enforcement Faces Higher Bar in Acquiring Electronic Information

Sep. 16, 2015

Privacy and Cybersecurity in Canada: Legal Risk Update

Sep. 16, 2015

Examining Evolving Legal Ethics in the Age of the Cloud, Mobile Devices and Social Media (Part Two of Two)  

Jul. 29, 2015

Seventh Circuit Reopens a Door for Plaintiffs in Data Breach Class Actions

Jul. 15, 2015

Analyzing and Complying with Cyber Law from Different Vantage Points (Part One of Two)

Jul. 1, 2015

Preserving Privilege Before and After a Cybersecurity Incident (Part Two of Two)

Jul. 1, 2015

What Companies Need to Know About the FCC’s Actions Against Unwanted Calls and Texts

Jun. 17, 2015

Preserving Privilege Before and After a Cybersecurity Incident (Part One of Two)

May 6, 2015

Lessons from the 2013 Target Data Breach: What Future Resolutions of Large-Scale Data Breaches May Look Like

May 21, 2025

Update on Digital Governance in India and China

May 21, 2025

Texas AG’s Billion-Dollar Settlement With Google Highlights Biometric Data Use Compliance Considerations

May 14, 2025

“Everyone Wants to Speak to the CISO” and Other Realities of Addressing Vendor Breaches

May 14, 2025

State Privacy Regulators Share Enforcement Agenda and How to Ensure a Smoother Investigation

May 14, 2025

DOJ Guidance on Bulk Sensitive Data Rules: Compliance Program, Recordkeeping and Reporting

May 7, 2025

DOJ Guidance on Bulk Sensitive Data Rules: Enforcement Grace Period and Prohibited Transactions

May 7, 2025

Rethinking Click-Through Training: Integration Into a Comprehensive Training Program

Apr. 30, 2025

Compliance Takeaways From the CPPA’s Enforcement Action Against Honda

Apr. 30, 2025

Connecticut AG’s Report Reveals Privacy Enforcers Reaching Deeper Into Their State Laws

Apr. 30, 2025

NAVEX Statistics on Internal Reporting and Substantiation

Apr. 23, 2025

Sale of 23andMe’s Genetic Data: Lessons for Companies Around Sensitive Data

Apr. 23, 2025

How Ericsson Made Compliance Training Must-See TV

Apr. 23, 2025

Redefining Compliance From a Consumer-Centric Obligation to Product-Embedded Enablement

Apr. 16, 2025

Sale of 23andMe’s Genetic Data: Implications of the Motions for a Privacy Ombudsman and State Laws

Apr. 9, 2025

Six Steps to Address the SEC’s Trump Era Cyber Enforcement Priorities

Apr. 9, 2025

Data Clean Rooms and De-Identified Data Are Among Concerns in Navigating State Privacy Laws

Apr. 2, 2025

California’s Delete Act Enforcement Sweep Takeaways

Apr. 2, 2025

2025 LRN Effectiveness Survey Finds Lags in Third-Party Diligence

Apr. 2, 2025

Statistics on Privacy Staffing, Budgets and Compliance Culture

Mar. 26, 2025

Navigating Global Privacy Control’s Not-So-Simple Implementation

Mar. 12, 2025

Managing Tracking Technologies and Their Privacy Dilemmas in 2025

Mar. 12, 2025

The Algorithmic CCO: Practical Steps for Implementing AI in Compliance

Mar. 12, 2025

How CPOs Can Manage Evolving Privacy Risk and Add Value to Their Organizations

Mar. 5, 2025

The Algorithmic CCO: AI’s Role in Shaping the Future of Hedge Fund Governance

Mar. 5, 2025

Navigating Evolving Mobile App Privacy Issues

Feb. 26, 2025

The Tension Between Data Scraping and Data Protection in an AI-Driven World

Feb. 26, 2025

Survey Finds Increased Value in Having a Culture of Compliance

Feb. 19, 2025

AI Meets GDPR: Mitigating Risks and Scaling Compliance in the Development and Deployment of AI Models

Feb. 12, 2025

Children’s Privacy Grows Up: Seven Compliance Areas for Protecting Teens

Feb. 12, 2025

New Jersey and Oregon Advisories Contribute to AI Guidance From State AGs

Feb. 5, 2025

California’s Pending Automated Decision-Making Technology Regulations Will Further Focus Consumers’ Attention on AI

Feb. 5, 2025

AI Meets GDPR: EDPB Weighs In on AI Models

Jan. 29, 2025

Children’s Privacy Grows Up: FTC Amends COPPA Rule and Targets Data Sharing

Jan. 29, 2025

Examining DOJ’s Final Rules on Access to Government and Sensitive U.S. Personal Data

Jan. 15, 2025

Children’s Privacy Grows Up: Examining New Laws That Now Protect Older Teens

Jan. 8, 2025

Website Privacy Compliance Statistics and Practical Takeaways

Jan. 8, 2025

How to Adjust to the FTC’s Crackdown on Sensitive Location Data

Dec. 18, 2024

Advertising Opt‑Outs Drive New Privacy Strategies in 2025

Dec. 18, 2024

Transparency Needed, This Time in Roles for Privacy Professionals

Dec. 11, 2024

Preparing for U.S. State Law Privacy Compliance in 2025

Dec. 11, 2024

DOJ’s 2024 Edits to the ECCP: Speaking Up, Compliance Resources and Lessons Learned

Dec. 11, 2024

Deciphering the New CPPA Proposed Regulations for Data Brokers

Nov. 27, 2024

Considerations for Adtech Stemming From Oracle’s $115 Million Settlement

Nov. 20, 2024

DOJ’s 2024 Edits to the ECCP: Data Analytics to Find Risks and Measure Effectiveness

Nov. 13, 2024

GDPR Enforcement’s New Phase: Navigating Privacy Investigations in Europe

Nov. 13, 2024

To Work Effectively, CCOs Need Authority, Autonomy and Information

Nov. 13, 2024

Unpacking the Second Circuit’s Bombshell VPPA Ruling

Nov. 6, 2024

DOJ’s 2024 Edits to the ECCP: Some History and AI Expectations

Nov. 6, 2024

Seventh Circuit Refuses to Compel BIPA Mass Arbitration Against Samsung: Takeaways and Lessons

Nov. 6, 2024

GDPR Enforcement’s New Phase: More Predictability, and New Rules on the Way

Oct. 30, 2024

Seventh Circuit Refuses to Compel BIPA Mass Arbitration Against Samsung: Legal Analysis Breakdown

Oct. 23, 2024

Answers to Six Key Questions About How Enforcers View Gatekeepers

Oct. 23, 2024

Aftermath of the Ninth Circuit BIPA Liability Shake‑Up in Zellmer v. Meta

Oct. 16, 2024

Meeting DOJ Expectations Post-Resolution Requires Realism and Accountability

Oct. 16, 2024

Cybersecurity and Privacy: Two Sides of the Same Coin

Oct. 16, 2024

Deciphering California’s Pioneering Mandate for an AI Nutrition Label 

Oct. 9, 2024

What CCOs Should Know About the DOJ’s Efforts to Curtail Criminal Use of AI

Oct. 9, 2024

Loyal to a Fault? Customer Loyalty Programs in the Age of Comprehensive Privacy Laws

Oct. 9, 2024

Emojis and Video Communications: Compliance Practices to Overcome Recordkeeping Challenges

Oct. 2, 2024

FTC and State Enforcers Reveal What’s Next and What to Do About It

Oct. 2, 2024

How to Manage AI Procurement: Five Steps

Oct. 2, 2024

Emojis and Video Communications: The Next Frontier of SEC Scrutiny?

Sep. 25, 2024

Practical Strategies for Effective Consent Management

Sep. 25, 2024

FTC Signals Stricter Children’s Enforcement in NGL Labs Settlement: Compliance Lessons

Sep. 18, 2024

FTC Signals Stricter Children’s Enforcement in NGL Labs Settlement: Key Violations and Settlement Terms

Sep. 18, 2024

How to Manage AI Procurement: Leadership and Preparation

Sep. 18, 2024

SEC Penalizes Adviser for Failing to Preserve Off-Channel Communications

Sep. 11, 2024

Takeaways and Looming Questions After Ninth Circuit Cuts DPIA From California’s Age-Appropriate Design Code

Sep. 4, 2024

Making the Business Case for Privacy

Aug. 28, 2024

6) How Companies Can Identify and Prevent Unlawful Dark Patterns

Aug. 14, 2024

Considerations for Adtech Stemming From Oracle’s $115‑Million Settlement

Aug. 7, 2024

SolarWinds Decision: Court Narrows Case, but SEC’s Surviving Claims Alarm CISOs

Aug. 7, 2024

How Privacy Efforts Can Boost Revenue

Jul. 24, 2024

Compliance Program Implementation: Compliance Calendars and Testing

Jul. 17, 2024

FCC Forfeiture Orders Underline Need for Vigilance on Geolocation Sharing

Jul. 17, 2024

Thoughts From DOJ Experts on Using Data Analytics to Strengthen Compliance Programs

Jul. 3, 2024

4) Navigating Tracking Technologies

Jul. 3, 2024

2) Choosing Privacy Tech Solutions

Jun. 26, 2024

Measures for Complying With 19 (and Counting) State Privacy Laws

Jun. 19, 2024

Examining Distinctive Aspects of Minnesota’s Demanding New Privacy Law

Jun. 12, 2024

Privacy and Data Security Regulators Discuss Enforcement Priorities and Collaborative Efforts

Jun. 12, 2024

Lessons From the Trenches: Winning Strategies for Defeating Pen Register Lawsuits

Jun. 5, 2024

In‑House Perspectives on Compliance’s Role in Managing New and Emerging Risks

Jun. 5, 2024

Preparing to Comply With the Protecting Americans’ Data From Foreign Adversaries Act

Jun. 5, 2024

How to Address the Colorado AI Act’s “Complex Compliance Regime”

May 29, 2024

Testing Is an Integral Component of Compliance Programs

May 29, 2024

Navigating the Global Cross-Border Privacy Rules and Privacy Recognition for Processors Certification Systems

May 15, 2024

New E.U. Directive Expands Scope of Due Diligence

May 8, 2024

Takeaways From FTC’s Orders Targeting Digital Health Companies

May 8, 2024

Answers to Top Questions About the E.U. AI Act: Practical Steps and What’s Next

May 1, 2024

Off-Channel Communications Are Not the Only Source of Electronic Recordkeeping Violations

May 1, 2024

Answers to Top Questions About the E.U. AI Act: Risk Tiers and Big-Player Transparency

Apr. 24, 2024

Answers to Top Questions About the E.U. AI Act: Reach and Unique Requirements

Apr. 24, 2024

Examining Maryland’s Game-Changing Data Minimization Requirements

Apr. 17, 2024

Tracking Technologies: Compliance Challenges and Solutions

Apr. 17, 2024

How to Achieve Privacy by Design With a Technical Privacy Review

Apr. 17, 2024

AI Governance Strategies for Privacy Pros

Apr. 10, 2024

Guidance on Addressing Compliance Challenges With the Newly Effective E.U. Digital Services Act

Apr. 10, 2024

Practical Insights Direct From U.S. State Privacy Enforcers

Apr. 10, 2024

Latest SEC Sweep of Off‑Channel Communications Both Befuddles and Turns Up the Heat on Investment Advisers

Apr. 3, 2024

Addressing the Operational Complexities of Complying With the Washington My Health My Data Act

Apr. 3, 2024

Examining Utah’s Pioneering State AI Law

Apr. 3, 2024

Crafting Effective Mobile Device Policies to Satisfy Regulatory Expectations

Mar. 20, 2024

Court Hands FTC Grounds to Curb Data Broker Sales

Mar. 20, 2024

AI Drives Rise in Private Funds’ Use of Alternative Data

Mar. 13, 2024

Connecticut AG’s Report Highlights Enforcement Risks and Points to Action Steps for Companies

Mar. 13, 2024

Fostering Collaboration and Communication Between Security and Compliance

Mar. 6, 2024

Lessons From California’s DoorDash Enforcement Action

Mar. 6, 2024

Scraping Battles: Global Privacy Regulators Urge Safeguards to Stop Data Scraping

Feb. 28, 2024

Legal and Ethical Issues in Use of Biometrics: FIDO, Identity-Proofing and Other Options

Feb. 21, 2024

Tracking Technologies: A 360‑Degree Governance Plan

Feb. 21, 2024

Legal and Ethical Issues in Use of Biometrics: Modality Selection, Implementation and State Laws

Feb. 21, 2024

Scraping Battles: Meta Loses Legal Effort to Halt Harvesting of Personal Profiles

Feb. 14, 2024

Nine Impacts of New Jersey and New Hampshire Privacy Laws

Feb. 7, 2024

Binance’s $4.3‑Billion Criminal Resolution Raises Questions on Crypto Guidance

Jan. 31, 2024

Compliance 5.0: A Culture-Centered Approach

Jan. 31, 2024

Tracking Technologies: A Deep Dive on What They Are and How They Work

Jan. 24, 2024

Google’s Wiretap Cases Highlight Evolving Privacy Transparency Standards

Jan. 17, 2024

No Regulator Is an Island: Bermuda Commissioner Discusses New Privacy Law and Global Enforcement

Jan. 17, 2024

Tracking Technologies: Privacy Regulation, Enforcement and Risk

Jan. 10, 2024

How Companies Can Identify and Prevent Unlawful Dark Patterns

Jan. 10, 2024

E.U. Takes Lead on AI and Climate Change Via ESG Regulation

Dec. 20, 2023

IBM, eBay and Walgreens CPOs Outline 10 Steps for Building AI Governance

Dec. 13, 2023

Navigating a Breach As a Third-Party Service Provider: Notifications, Network Decisions and Preserving Privilege

Dec. 6, 2023

Navigating a Breach As a Third-Party Service Provider: Communications and Investigation

Dec. 6, 2023

U.K. Penalizes Morgan Stanley for Lax Electronic Communications Practices

Nov. 29, 2023

Implications of EDPB Meta Ruling on Behavioral Advertising Practices

Nov. 8, 2023

Top Tips for Effective GC Succession Planning and Training

Nov. 8, 2023

Understanding the Growing Use of PETs

Nov. 1, 2023

Compliance Challenges in Records Management

Nov. 1, 2023

Examining Security Mandates, Including California’s Draft Audit Regulations, in State Privacy Laws

Nov. 1, 2023

Checklist for Selecting Privacy Tech Solutions

Oct. 25, 2023

Private Actions Under the CPRA: Settlement Considerations and Mitigating Risk

Oct. 25, 2023

Navigating Certification and Implementation Issues Under the U.S.-E.U. Data Privacy Framework

Oct. 25, 2023

U.K. Equifax Fine Calls for Stricter Parent-Subsidiary Data-Sharing Processes

Oct. 18, 2023

IBM, eBay and Walgreens CPOs Outline 10 Steps for Building AI Governance

Oct. 18, 2023

Private Actions Under the CPRA: Key Issues and Defense Strategies

Oct. 11, 2023

Benchmarking the Impact of State Privacy Laws on Digital Advertising

Oct. 4, 2023

Will California’s New Law Aimed at Data Brokers Require a “Delete Me” Button on All Websites?

Sep. 20, 2023

SEC and CFTC Continue to Penalize Firms for Electronic Communications Recordkeeping Violations

Sep. 13, 2023

Examining the Washington Attorney General’s FAQs on the My Health My Data Act

Sep. 13, 2023

Key Terms and Negotiation Issues in Data Processing Agreements

Sep. 6, 2023

E.U. Coordinated Enforcement Framework Focuses on DPOs

Sep. 6, 2023

An Analysis of the Liberal and Strict Provisions in India’s New Privacy Law

Aug. 23, 2023

2. Scrutiny Over Dark Patterns Presents Further Challenges in Online Contracting

Aug. 23, 2023

5. Xbox and Alexa COPPA Case Lessons Series

Aug. 16, 2023

Recent Developments in SEC, DOJ and Civil Litigation Efforts Targeting Off-Channel Electronic Communications

Aug. 16, 2023

Why Companies Unintentionally Fail to Honor Opt-Outs

Aug. 9, 2023

Selecting the Latest Privacy Tech Solutions: How to Kick the Tires and Decide

Aug. 9, 2023

Key Legal and Business Issues in AI-Related Contracts

Aug. 2, 2023

Selecting the Latest Privacy Tech Solutions: Four Preparatory Steps

Aug. 2, 2023

Navigating Evolving Data Breach Litigation and Regulatory Risks

Jul. 26, 2023

NAVEX Shares Benchmarking Data in 2023 State of Risk and Compliance Report

Jul. 26, 2023

Bridging the Atlantic: E.U.‑U.S. Data Privacy Framework Practical Takeaways

Jul. 19, 2023

CJEU Decision Adds Antitrust Regulators As New GDPR Concern for Companies

Jul. 12, 2023

SEC Remains Focused on Off-Channel Communications

Jul. 12, 2023

Analyzing 2023’s New State Privacy Laws: Oregon and Delaware Join the Strictest Tier

Jul. 5, 2023

A Roadmap to the Final Regulations Under the CPRA

Jul. 5, 2023

Party of Five: Connecticut Law Solidifies Consensus on State Privacy Standards

Jul. 5, 2023

How to Comply With the CPRA’s Data Minimization Standards

Jun. 28, 2023

CPOs Weigh In on Navigating Myriad Privacy and Security Laws Amid Dizzying Technological Advancements

Jun. 28, 2023

Analyzing 2023’s New State Privacy Laws: The First Six Plus Compliance Measures

Jun. 21, 2023

Xbox and Alexa COPPA Case Lessons: Avatars, Biometrics and Other New Expectations

Jun. 21, 2023

The Practical and Legal Complexities of Online Age Verification

Jun. 14, 2023

Deciphering California and U.K. Children’s Codes and Compliance Obligations

Jun. 14, 2023

Xbox and Alexa COPPA Case Lessons: Negotiating With the FTC Over Algorithms and Remedies

Jun. 14, 2023

Messaging Apps Come Under Increasing Regulatory Scrutiny

Jun. 7, 2023

Impact of State Privacy Laws on the Financial Services Sector

Jun. 7, 2023

Implications of CJEU Ruling on Compensation for GDPR Claims

May 31, 2023

How to Navigate the Rough Waters and Turning Tides of U.S. States’ Anti-ESG Movement and Europe’s Pro-ESG Measures (Part Two of Two)

May 31, 2023

Colorado Controllers: The Final (Rules’) Frontier

May 31, 2023

How CPOs Communicate Privacy’s Value to the Board

May 24, 2023

3. Managing Legal Issues Arising From Use of ChatGPT and Generative AI Series

May 17, 2023

Meta and Epic Cases Show FTC Toughening Its Children’s Privacy Enforcement

May 10, 2023

Making Sense of Evolving Regulations, Recent Enforcement Efforts and Antitrust Claims as to ESG Investing in the U.S. and E.U. (Part One of Two)

May 10, 2023

Aggressive Washington Health Privacy Law: Ten Compliance Priorities

May 3, 2023

Aggressive Washington Privacy Law: Right to Sue and Onerous Consent Obligations

May 3, 2023

VMware CPO Discusses the Evolution of the Privacy Role

Apr. 19, 2023

Expedia and Lululemon Privacy Pros Discuss Scaling Vendor Contracting for New Privacy Laws

Apr. 12, 2023

Complying With Europe’s Digital Services Act and Digital Markets Act

Apr. 5, 2023

Updates to the NSCP’s Firm and CCO Liability Framework

Apr. 5, 2023

Website-Tracking Lawsuits: Takeaways From New Dismissals of Wiretap Claims

Mar. 29, 2023

Use of Alternative Data Continues to Grow, Says New Survey

Mar. 29, 2023

Website-Tracking Lawsuits: A Guide to New Video Privacy Decisions Starring PBS and People.com

Mar. 29, 2023

FTC’s BetterHelp Case Prescribes Stronger Privacy Practices

Mar. 22, 2023

Managing Legal Issues Arising From Use of ChatGPT and Generative AI: Industry Considerations and Practical Compliance Measures

Mar. 15, 2023

Managing Legal Issues Arising From Use of ChatGPT and Generative AI: E.U. and U.S. Privacy Law Considerations

Mar. 15, 2023

A Roadmap to the Final Regulations Under the CPRA

Mar. 1, 2023

Getting Used to Zero Trust? Meet Zero Copy

Feb. 22, 2023

IAB Unveils Multistate Contract to Satisfy 2023 Laws’ Curbs on Targeted Ads

Feb. 15, 2023

Impact of Emerging Technologies on Financial Crime Risk Management

Feb. 15, 2023

Advice From a CISO and Lawyer on Best Practices in Information and Data Governance

Feb. 8, 2023

How to Comply With the CPRA’s Data Minimization Standards

Feb. 1, 2023

Key Privacy Issues for 2023

Jan. 25, 2023

France’s Cookie Enforcement Against TikTok and Microsoft Highlights Common Compliance Missteps

Jan. 25, 2023

E.U. Regulators Bar Meta From Requiring Users to Pay With Their Data

Jan. 18, 2023

Scrutiny Over Dark Patterns Presents Further Challenges in Online Contracting

Jan. 18, 2023

Electronic Communications, Cooperation Standards and Other Emerging Trends in the SEC’s Oversight of Private Funds

Jan. 18, 2023

A Sensitive Time for Location Data: Tips to Address New Rules and Vendor Standards

Jan. 4, 2023

FTC and $391-Million State AG Case Put Location Data Enforcement on the Map

Dec. 14, 2022

Taking Compliance Policies From Dense and Dry to Effective and Engaging

Dec. 14, 2022

Recent FTC Cases Highlight Evolving Regulatory Expectations in the Use of Multi-Factor Authentication

Dec. 14, 2022

The Importance of Being a PIPL Pleaser: Update and Predictions on China’s Data Protection Law One Year In

Dec. 7, 2022

How Lawyers Can Leverage the Shifting Environment to Enhance Compliance Programs

Dec. 7, 2022

Google Settlement Shows DOJ's Increased Focus on Data Preservation

Nov. 30, 2022

Navigating Evolving Social Media Risks

Nov. 30, 2022

Understanding and Implementing Privacy Audits

Nov. 30, 2022

FTC’s Drizly Case Shows Regulators Are Ready to Police Data’s Expiration Dates

Nov. 16, 2022

What the FAQ: Deciphering the European Commission Guidance on the New SCCs

Nov. 16, 2022

Compliance Checklist for Consumer and Employee DSARs

Nov. 9, 2022

Lessons From the Conviction of Uber’s Former CISO

Nov. 2, 2022

How the New E.U.-U.S. Data Privacy Framework Clears a Path for Transatlantic Business

Nov. 2, 2022

Revised Monaco Memo Affects Compensation, Clawbacks and Monitorships

Oct. 26, 2022

Navigating the Interplay of Breach Response and Breach Notification

Oct. 19, 2022

GM CCO Talks Data, Culture, ESG and Scope Creep

Oct. 12, 2022

Metaverse IRL: Are Companies Overlooking the Privacy Risks of NFTs and Crypto Wallets?

Oct. 12, 2022

How the Revised Monaco Memo Alters Deal Making and Strategy

Oct. 5, 2022

Metaverse IRL: Grappling With Biometric Data and Privacy Notices in VR Headsets

Oct. 5, 2022

A PR Blitz as DOJ Fine-Tunes Its Corporate Enforcement Policies

Sep. 28, 2022

Lessons From California’s First CCPA Enforcement Action

Sep. 21, 2022

Metaverse IRL: Tackling Privacy Amid the Rampant Hype and Burst of Deals

Sep. 21, 2022

Trio of Settled Enforcement Actions Highlights SEC Concerns About Identity Theft Policies and Procedures

Sep. 14, 2022

Shaping the BIPA Landscape: Avoiding Liability

Sep. 14, 2022

Robinhood Resolution a First for Cryptocurrency Enforcement in NY

Sep. 14, 2022

Compliance Survey Finds Data Management Challenges, Rising Costs and Increasing Uptake of RegTech

Aug. 24, 2022

Preparing for CPRA Compliance: Jurisdictional Focus or a More Holistic Approach?

Aug. 17, 2022

SEC Cyber Rules: How to Prepare for the New 10-K Disclosure Mandates

Jul. 27, 2022

Employee Data Under the CPRA: Rights Requests, Privacy Policies and Enforcement

Jul. 27, 2022

Designing a Privacy Center to Build Trust and Facilitate Business Growth

Jul. 20, 2022

Employee Data Under the CPRA: Key Rights and Restrictions

Jul. 20, 2022

Corporate Compliance and Enforcement Hot Topics With IBM VP Una Dean

Jul. 13, 2022

CPRA Draft Regulations: Essential Takeaways and 10 Actions to Take Now

Jun. 22, 2022

Learning From Twitter’s $150-Million Privacy Disclosure Mistakes

Jun. 8, 2022

Regulation Looms for Sharing of Sensitive Financial Data

Jun. 1, 2022

FINRA Clarifies Stance on CCO Supervisory Liability

Jun. 1, 2022

Roadmap for Building an Efficient Global Privacy Program: Maintenance

May 25, 2022

TV Privacy: Will the TV Industry Agree to Standardize Consent on Screen?

May 18, 2022

Roadmap for Building an Efficient Global Privacy Program: Buy-In, Scalability and Outside Resources

May 18, 2022

Navigating the Intersection of Blockchain and Data Privacy Laws

May 18, 2022

TV Privacy: Can Old Remotes Handle New Consent Requirements?

May 11, 2022

Roadmap for Building an Efficient Global Privacy Program: Scope and Prioritization

May 11, 2022

Party of Five: Connecticut Law Solidifies Consensus on State Privacy Standards

May 4, 2022

Roadmap for Building an Efficient Global Privacy Program: Organizational Structure

May 4, 2022

Effective Use of Privacy Impact Assessments

Apr. 27, 2022

Preparing for CPRA Compliance: Jurisdictional Focus or a More Holistic Approach?

Apr. 27, 2022

New Utah Privacy Law Marks a Shift in State Privacy Legislation

Apr. 20, 2022

FTC’s Khan and Phillips Deliver Views on Future of Data Privacy Enforcement

Apr. 20, 2022

Privacy Enforcers Across the Globe Band Together to Coordinate Investigations

Apr. 13, 2022

U.S., E.U. Announce Trans-Atlantic Data Privacy Framework: What Companies Can Do Now

Apr. 13, 2022

California AG Opinion Hands Companies New Tasks for AI, Data Maps, Marketing

Mar. 30, 2022

The Parallels and Distinctions Between Investigations and Culture Reviews

Mar. 30, 2022

Drafting Data and Cybersecurity Provisions in Third-Party Vendor Agreements

Mar. 23, 2022

Are “Privacy-First” Clean Rooms Safe From Regulators?

Mar. 23, 2022

Identifying and Tackling Privacy and Cyber Due Diligence Challenges in M&A

Mar. 16, 2022

How Combining Approaches to Data Analytics Can Yield Powerful Insights

Mar. 9, 2022

A Look at the NSCP’s Firm and CCO Liability Framework

Mar. 2, 2022

Blockchain Recordkeeping Stirs Privacy Concerns

Mar. 2, 2022

Navigating Post-Schrems II International Data Transfer Waters: SCCs and Supplementary Measures

Feb. 23, 2022

Navigating Post-Schrems II International Data Transfer Waters: Challenges and TIAs

Feb. 23, 2022

Ad Industry’s Third-Party Data Use Grew Despite Impending Cookie Shutdown

Feb. 16, 2022

The Privacy and Antitrust Paradox in the Age of Data

Feb. 9, 2022

Leveraging Partnerships to Operationalize Privacy Programs

Feb. 9, 2022

Will It Be Goodbye Forever? Navigating Consumer Requests to Delete Personal Data

Feb. 2, 2022

Compliance Takeaways From the Latest GDPR Enforcement Statistics

Jan. 26, 2022

Personal Liability and Compliance Resourcing Are Top Concerns Among CCOs, Surveys Show

Jan. 19, 2022

Two European Regulators Warn Behavioral Advertising Skates on Thin Ice

Jan. 19, 2022

Privacy Resolutions for 2022

Jan. 19, 2022

Privacy and Security Due Diligence in M&A Transactions: Going Beyond the Questionnaire

Jan. 5, 2022

A Guide to Privacy Frameworks: Implementation and Maintenance

Dec. 15, 2021

Understanding Differential Privacy

Dec. 15, 2021

A Guide to Privacy Frameworks: Finding the Best Fit

Dec. 8, 2021

Privacy Tech Products Hold Promise but Sector Faces Hurdles

Dec. 8, 2021

A Guide to Privacy Frameworks: Examining Options

Dec. 01, 2021

Using Technology and Outsourcing to Enhance Compliance Programs and Manage Conflicts of Interest

Dec. 01, 2021

FTC Sets Wheels in Motion for a Broad Privacy Rule Restricting Data Collection

Nov. 17, 2021

Data Localization: Cybersecurity Challenges Abound

Nov. 17, 2021

Practical Approaches to Conducting Transfer Impact Assessments Under the GDPR

Nov. 10, 2021

Data Localization: New Compliance Headaches and Costs Across the Globe

Nov. 3, 2021

In-House Insight on Handling Data Subject Access Requests Under Multiple Privacy Regimes

Nov. 3, 2021

Data Localization: Laws Spread and Enforcement Rises

Oct. 27, 2021

Lessons From the WhatsApp Decision on GDPR Transparency Requirements: Compliance Foundations

Oct. 20, 2021

U.K. Data Privacy Officers Discuss Challenges and Concerns

Oct. 20, 2021

Collective Actions in the U.K. After Lloyd v. Google

Oct. 20, 2021

Lessons From the WhatsApp Decision on GDPR Transparency Requirements: Enforcement Takeaways

Oct. 13, 2021

China’s First Information Protection Law: Compliance Essentials

Sep. 22, 2021

Examining the Intersection of Voiceprints and Data Privacy Laws

Sep. 22, 2021

Jacki Cheslow on IEEE’s Remote Program Assessment

Sep. 15, 2021

Electronic Communications: Using Third Parties for Compliance, Mitigating Social Media Risks and Fulfilling Document Requests

Sep. 15, 2021

Leadership Insights From CPOs at Google, J.P. Morgan and Dow Jones

Sep. 8, 2021

Imperva’s Global Data Privacy Officer Discusses Privacy by Design

Sep. 8, 2021

What to Expect From the FCC and FTC Under the Biden Administration

Sep. 8, 2021

Electronic Communications: Useful Training Techniques and Policies and Procedures to Adopt

Aug. 25, 2021

U.K. Data Protection Regulator Smooths Way for Fund Managers to Transfer Data to SEC

Aug. 18, 2021

Electronic Communications: Current Technological Landscape and Relevant Regulatory Measures

Aug. 4, 2021

Evaluating Privacy and Cybersecurity Risks in Emerging Technology Transactions: Artificial Intelligence and EdTech

Jul. 21, 2021

Vaccines and Testing in the Post-Pandemic Workplace: Answers to the Tough Questions

Jul. 21, 2021

Shedding Light on Dark Patterns: What Financial Institutions Need to Know

Jul. 14, 2021

Vaccines and Testing in the Post-Pandemic Workplace: Understanding the Legal Framework and Making a Balanced Plan

Jul. 14, 2021

Personal Data Transfers After Year Zero: A More Appealing Set of EDPB Recommendations?

Jun. 30, 2021

DOL Begins Cyber Audits to Protect U.S. Workers’ Retirement Savings

Jun. 30, 2021

Personal Data Transfers After Year Zero: Are the New SCCs a Paradigm Shift?

Jun. 23, 2021

Colorado Privacy Law Finishes Third, but Could Become the New Standard

Jun. 23, 2021

Three Years In, GDPR Legal Landscape Remains in Flux

Jun. 16, 2021

The Impact of Recent Legislative and Litigation Trends on Commercial Use of De-Identified Data

Jun. 16, 2021

Leveraging Policies and Culture: A Recipe for Success

Jun. 9, 2021

To “Cure” or Not to “Cure,” That Is the Question

Jun. 2, 2021

Post-COVID Compliance Strategies: Dealing With Persistent Heightened Risks

Jun. 2, 2021

U.K. Data Protection Regulator Smooths Way for Fund Managers to Transfer Data to SEC

May 5, 2021

Balancing Legalese and Simplicity in Modern Privacy Policies

Apr. 28, 2021

First 100 Days As GC/CCO: Managing Daily Work, Performing Risk Assessments and Looking Ahead

Apr. 21, 2021

Supreme Court’s Facebook Decision Narrows Applicability of the TCPA, but Companies Are Not Home Free

Apr. 21, 2021

First 100 Days As GC/CCO: Developing Knowledge and Forging Key Relationships

Apr. 14, 2021

First 100 Days As GC/CCO: Preparing for the Role and Setting the Tone

Apr. 7, 2021

Behind the Scenes: California AG’s Non-Public CCPA Inquiries

Apr. 7, 2021

Former Twitter and eBay Counsel Talks Overblown Fears, Third-Party Data Management, and CDA Section 230

Apr. 7, 2021

Did Clubhouse Sacrifice Privacy for Innovation? How to Find the Balance 

Mar. 31, 2021

Managing Vendor Contracts From the Data Controller's Perspective

Mar. 31, 2021

How Do You Put a System of Controls in Place When Your Target Keeps Moving?

Mar. 31, 2021

KBR v. SFO: Implications for Overseas Document Production

Mar. 24, 2021

Recommended Data Strategies As Google Swears Off Web Tracking

Mar. 24, 2021

Privacy and Security Provisions in Vendor Agreements: Key Data Processing Considerations

Mar. 17, 2021

Privacy and Security Provisions in Vendor Agreements: Assessing the Risks

Mar. 10, 2021

AI for Compliance: Five Workarounds for Asymmetric Data Sets

Mar. 10, 2021

Preparing for the CPRA’s New Consumer Rights Requirements

Mar. 10, 2021

Familiar and Fresh Mandates in Virginia’s New Privacy Law

Mar. 3, 2021

Best Practices for Data Transfers in the Wake of Schrems II

Feb. 24, 2021

Cargill Compliance Director Discusses Putting Training Data to Work

Feb. 10, 2021

GDPR Lives On in the U.K. Post-Brexit

Feb. 3, 2021

Expect Continuing Regulatory Focus on Cybersecurity and Data Protection in 2021

Jan. 27, 2021

The Potential Legal Implications of Web Scraping for Market Research

Jan. 20, 2021

Privacy Resolutions for 2021

Jan. 20, 2021

Disputed Twitter Fine Offers Breach Response Lessons

Jan. 13, 2021

Checklist for IoT Security Audits

Jan. 6, 2021

Maintaining Privacy While Staying Competitive in an Evolving Regulatory Landscape

Jan. 6, 2021

Privacy and Security Risks in International Arbitration: Managing Remote Proceedings

Jan. 6, 2021

Six Practical Tips for Building an Effective Privacy Risk Assessment Program

Dec. 16, 2020

AI for Compliance: Building a Model

Dec. 16, 2020

Privacy and Security Risks in International Arbitration: Threats and the Information Security Protocol

Dec. 9, 2020

Strategies for Managing the Intersection of Cybersecurity and New Technologies

Dec. 2, 2020

How CCOs Can Avoid Personal Liability for an Organization’s Compliance Failures

Dec. 2, 2020

Facebook Wiretap Ruling Inspires Slew of Lawsuits Over Consumer Tracking

Dec. 2, 2020

ICO Hones GDPR Enforcement Approach With Reduced Fines for British Airways, Marriott and Ticketmaster

Nov. 18, 2020

SEC Commissioner Peirce Shares Views on Personal Liability for CCOs

Nov. 18, 2020

Show Me the Data: How to Conduct Audits for Data Minimization

Nov. 11, 2020

AI for Compliance: Foundations

Nov. 11, 2020

Understanding the World’s New Four-Letter Privacy Law: China’s PIPL

Nov. 11, 2020

The Intelligent Workplace in the Age of a Pandemic: Six Privacy and Security Safeguards

Nov. 4, 2020

Comparing U.S. and E.U. Approaches to Incident Response and Breach Notification

Nov. 4, 2020

A Guided Tour of Enterprise IoT Device Hazards

Oct. 28, 2020

The Intelligent Workplace in the Age of a Pandemic: Balancing Innovation and Risk

Oct. 21, 2020

How Lockheed Uses Big Data to Evaluate Risk at Small Worksites

Oct. 14, 2020

Top Priorities for Compliance With Brazil’s New Personal Data Protection Law

Oct. 14, 2020

H&M’s $41M GDPR Fine Underscores Importance of Employee Data Handling

Oct. 7, 2020

How to Address Intensifying Enterprise IoT Security Risks

Sep. 30, 2020

What to Expect From the CPRA – California’s New Proposed Privacy Law

Sep. 23, 2020

Apple Overhauls Privacy for iPhone Apps, but Will It Enforce Its Policies?

Sep. 16, 2020

Four Principles Underlying Microsoft’s Compliance Analytics Program

Sep. 9, 2020

Implementing the CCPA Regulations: Are You Ready?

Sep. 2, 2020

After Death of the Cookie, New Advertising Strategies Raise Compliance Questions

Sep. 2, 2020

Business Continuity Plans, Budgets and More: Hot Compliance Topics for Investment Advisers

Aug. 19, 2020

Schrems II: Ten Initial Steps and Where U.S.-E.U. Data Transfers Are Heading After the EDPB Guidance

Aug. 12, 2020

Not Just TikTok: How Companies Can Mitigate Risk of Employee Social Media Use

Aug. 12, 2020

Navigating China’s Cybersecurity Regulatory Maze

Aug. 5, 2020

Early EDPB Guidance in the Wake of Schrems II Signals Where E.U.-U.S. Data Transfers Are Headed

Aug. 5, 2020

CCPA and Online Ads: Contract and Compliance Consequences

Jul. 29, 2020

CCPA and Online Ads: Facebook Finally Acts, AG Starts Enforcement

Jul. 22, 2020

Ten Initial Steps for E.U. and U.S. Companies in Light of Schrems II Ruling

Jul. 15, 2020

Back to the Table: CCPA Regulations Spark New Wave of Service-Provider Negotiations

Jun. 24, 2020

Balancing Privacy Rights and Innovation in Digital Contact Tracing

Jun. 24, 2020

Perspectives From the Public and Private Sectors on Information Sharing During COVID-19

Jun. 24, 2020

How to Comply With Key CCPA Notice and Consumer Request Requirements

Jun. 17, 2020

Privacy Settings May Serve as One-Step CCPA Opt-Out From Sale

Jun. 17, 2020

The (Im)Possibilities of Scientific Research Under the GDPR

Jun. 10, 2020

How Compliance Departments Are Responding to COVID‑19

May 27, 2020

Insights on Building a Compliance Program at a New Company

May 20, 2020

FTC and ICO Commissioners Discuss the Problems With Pandemic Tech and Their Enforcement Approaches

May 20, 2020

Did Adtech Fix Its CCPA Problem? IAB’s GC Discusses New Contract for Data Sales

May 13, 2020

NIST Privacy Framework: Privacy Controls for an Era of Digital Transformation

May 6, 2020

NIST Privacy Framework: Insights on New Tool for Managing Privacy Risks

Apr. 29, 2020

What Is the Potential Liability for Zoombombing, and How Safe Are Zoom Alternatives?

Apr. 22, 2020

GDPR Enforcement Lessons and New ICO Guidance on COVID‑19

Apr. 22, 2020

Morrisons Ruling Lets U.K. Employers Off the Hook for Rogue Employee Data Leaks

Apr. 15, 2020

Takeaways From Former FTC Officials on 2019 Enforcement Actions: Data Security Guidance and Enforcement Predictions

Apr. 15, 2020

Report on CCO Liability Calls for More Regulatory Cooperation

Apr. 8, 2020

Wide-Ranging Lessons From Notable Breaches in Q1

Apr. 8, 2020

Takeaways From Former FTC Officials on the Commission’s 2019 Enforcement: General, Financial and Children’s Privacy

Apr. 1, 2020

A Considered Cooperation Approach Is Vital in ICO Data Protection Audits

Mar. 25, 2020

Gauging the GDPR’s Global Reach

Mar. 25, 2020

Companywide Work From Home: Six Cybersecurity Considerations

Mar. 11, 2020

Privacy and Cyber Due Diligence in M&A Transactions

Feb. 26, 2020

Tips From Ponemon/Experian Survey on Building an Incident Response Plan That Fosters Confidence

Feb. 19, 2020

Best Practices for Using Alternative Data: Mitigating Regulatory Risks

Feb. 19, 2020

Consciously Coupling: Tackling the Juxtaposition Between Adtech and Privacy

Feb. 12, 2020

How to Approach CCPA’s Under-16 Opt‑in Consent

Feb. 12, 2020

Compliance Records Are a Strategic Gold Mine

Feb. 12, 2020

Best Practices for Using Alternative Data: Collection and Provider Management

Feb. 5, 2020

Defining, Implementing and Documenting “Reasonable Security”

Feb. 5, 2020

The Rise of Facial Recognition Technology: Mitigating Risk

Jan. 29, 2020

30 Creative Ideas for Compliance Messaging

Jan. 29, 2020

The Rise of Facial Recognition Technology: Mapping the Legal Framework

Jan. 29, 2020

Establishing a Foundation for Breach-Notification Compliance in a Sea of Privacy Laws

Jan. 22, 2020

The Rise of Facial Recognition Technology: Uses and Risks

Jan. 8, 2020

How eBay and PayPal Use Key Performance Indicators to Evaluate and Improve Privacy Programs

Dec. 18, 2019

FTC Spyware Takedown Highlights Employee Monitoring Privacy Shifts

Dec. 18, 2019

Not Just the GDPR: Privacy Laws in Belarus, Russia, Switzerland, Turkey and Ukraine

Dec. 11, 2019

How to Handle E.U. Data Subject Access Requests

Dec. 11, 2019

Not Just GDPR: Examining the Other European Privacy Laws 

Dec. 4, 2019

U.K. and U.S. Sign First E-Evidence Pact Under the CLOUD Act: A Look at the Privacy Protections

Nov. 20, 2019

U.K. and U.S. Sign First E-Evidence Pact Under the CLOUD Act: Fewer Hurdles, More Clarity and New Questions

Nov. 13, 2019

Updating Vendor Agreements to Comply With CCPA: Non-Third Parties and Key Steps

Nov. 6, 2019

Updating Vendor Agreements to Comply With CCPA: Service-Provider Exemption and Corporate Approaches

Oct. 30, 2019

Broad but Limited Reach of GDPR Highlighted in ECJ Google Ruling on “Right to Be Forgotten”

Oct. 23, 2019

ICO Enforcement Takeaways After Marriott and British Airways

Oct. 16, 2019

Portuguese DPA Holds Parts of Portuguese Data Protection Law Inconsistent With GDPR

Oct. 16, 2019

How Uber, eBay and Pitney Bowes Built Principles-Based Global Privacy Programs

Oct. 9, 2019

CCPA Close-Up: Examining the GLBA Carve-Out and How Financial Institutions Can Evaluate Applicability

Oct. 9, 2019

Does the GDPR Disadvantage Non-E.U. Companies? Addressing the Lead Supervisory Authority Dilemma (Part Two)

Oct. 2, 2019

CCPA Close-Up: Review of Amendments and How to Prepare for Compliance

Oct. 2, 2019

Preserving Customer Goodwill After a Breach

Oct. 2, 2019

Does the GDPR Disadvantage Non-E.U. Companies? The Benefits of a Lead Supervisory Authority (Part One of Two)

Sep. 18, 2019

Far-Reaching Google and YouTube Settlement Offers COPPA Compliance Lessons

Sep. 11, 2019

Lessons From Equifax on How to Mitigate Post-Breach Legal Liability

Aug. 21, 2019

Examining Portugal’s GDPR Implementation Statute

Aug. 21, 2019

Third-Party Data Breaches Highlight the Importance of Vetting Vendors in Compliance With GDPR and CCPA

Aug. 7, 2019

How Facebook’s $5-Billion FTC Settlement Is Shaping Compliance Expectations

Jul. 31, 2019

The Growing Role of the Chief Data Officer: Compliance and Third Parties

Jul. 31, 2019

Learning From the Equifax Settlement

Jul. 24, 2019

Equifax and Facebook Settlements Overshadow More Routine FTC Summer Settlements

Jul. 24, 2019

The Growing Role of the Chief Data Officer: Reporting Structures and Budget

Jul. 17, 2019

Maine Enacts Sweeping Broadband Customer Privacy Law

Jul. 17, 2019

The Growing Role of the Chief Data Officer: Skill Sets, Priorities and Collaboration

Jul. 10, 2019

Parental Liability in the E.U.: Mitigating Liability at Various Stages of Portfolio Company Ownership

Jul. 10, 2019

Can GDPR Hinder AI Made in Europe?

Jul. 3, 2019

Combatting Privacy Issues Arising From Geolocation Data Use

Jul. 3, 2019

Analyzing Early GDPR Enforcement

Jun. 26, 2019

Parental Liability in the E.U.: Rebuttable Presumption of Decisive Influence and Four Misconceptions About Avoiding Liability

Jun. 26, 2019

Employee Privacy and Off-Duty Conduct: Balancing Company Interests Against Employee Rights

Jun. 19, 2019

Tips From Lockheed and Groupon on Developing GC-CISO Partnerships to Improve Security and Incident Response

Jun. 19, 2019

Parental Liability in the E.U.: “Undertakings” and Potential Scope of Risk for Parent Entities

Jun. 19, 2019

Kids, Privacy & Legal Compliance

Jun. 5, 2019

Irish Data Protection Commissioner Helen Dixon on Breach Notification, the Role of the DPO and a U.S. Privacy Law

May 29, 2019

Irish DPC Helen Dixon on GDPR Enforcement Hurdles One Year In

May 22, 2019

Deputy Assistant Attorney General Seeks to Dispel CLOUD Act Misunderstandings One Year In

May 15, 2019

ECJ Confirms Direct Parental Liability for Civil Damages for Subsidiary Antitrust or GDPR Violations

May 8, 2019

Lessons From FTC 2018 Privacy and Data Security Update: Hearings, Reports and 2019 Predictions

May 8, 2019

Making the Case for Increased Privacy Budgets Using Data and Diplomacy

May 1, 2019

Fresenius and Pearson Compliance Directors Discuss Corporate Community-Building

May 1, 2019

Lessons From FTC 2018 Privacy and Data Security Update: Financial Privacy, COPPA and International Enforcement

Apr. 24, 2019

Jeopardy, Coasters and the Behavioral Clock: Compliance Leaders at Fresenius and Pearson Discuss Effective Long- and Short-Term Initiatives

Apr. 24, 2019

Lessons From FTC's 2018 Privacy and Data Security Update: Enforcement Takeaways

Apr. 17, 2019

GPEN Report Highlights Key Areas for Data Privacy Improvement

Apr. 10, 2019

Combatting Privacy Issues Arising From Geolocation Data Use: Five Risk-Mitigation Strategies

Apr. 3, 2019

Combatting Privacy Issues Arising From Geolocation Data Use: Understanding the Legal Landscape

Mar. 27, 2019

Navigating the Risks of Alternative Data Collection and Use

Mar. 27, 2019

Companies May Need to Re-Examine Approach to Breach Response Preparedness, According to Experian Survey

Mar. 20, 2019

COPPA Compliance Lessons Following Musical.ly’s $5.7 Million FTC Settlement

Mar. 20, 2019

A Quick-Start Guide to Creating a Compliance Champion Program

Mar. 13, 2019

Takeaways From 2018 COPPA Developments and a Forward-Thinking Approach to Compliance

Feb. 27, 2019

Preparing for the CCPA: Securing Buy-In and Setting the Scope

Feb. 27, 2019

U.K. Employers on the Hook for Rogue Employee Data Leaks Post-Morrison​​​​​

Feb. 20, 2019

Implications of the Illinois Supreme Court’s BIPA Holding Against Six Flags

Feb. 20, 2019

ACA Aponix-NSCP Cyber Survey Finds Growing Numbers of Security Incidents, Cloud Use and Regulatory Burdens

Feb. 6, 2019

Examining the New Requirements and Broad Definition of Data Broker Under Vermont’s New Law

Feb. 6, 2019

Analyzing Early GDPR Enforcement: France

Jan. 30, 2019

Analyzing Early GDPR Enforcement: U.K. and Austria

Jan. 23, 2019

Analyzing Early GDPR Enforcement: Portugal and Germany

Jan. 23, 2019

Illinois Federal Court Denies Standing in BIPA Claim Against Google

Jan. 16, 2019

GDPR Provides Model for Privacy and Security Laws in Latin America and Asia (Part Two of Two)

Jan. 9, 2019

GDPR Provides Model for Privacy and Security Laws in Latin America and Asia (Part One of Two)

Dec. 19, 2018

Interim Response Lessons From the Marriott Breach

Dec. 12, 2018

Illinois Appellate Decision Creates Split on Standing to Sue Under BIPA

Dec. 12, 2018

Implications of a Dynamic Regulatory and Threat Environment on E.U. and U.S. Cyber Insurance Markets

Dec. 5, 2018

Insights From Uber: Building Bridges Between Legal and Engineering

Nov. 28, 2018

Insights From Uber: An Inside Look at Its Privacy Team Structure and How Legal and Tech Collaborated on Its Differential Privacy Tool

Nov. 14, 2018

How Privacy Professionals Can Benefit Cybersecurity Programs: Practical Tips From Gap and Privacy Panacea

Nov. 7, 2018

How GoDaddy Built an Effective Privacy Program

Oct. 31, 2018

How to Comply With Canada’s New Privacy Breach Reporting and Record-Keeping Rules

Oct. 24, 2018

California Enacts Groundbreaking IoT Law and Requires Disclosure of Bot Use

Oct. 17, 2018

Regulating AI: U.S., E.U. and Industry Laws and Guidance

Sep. 19, 2018

Evolving Roles of Privacy and Security Professionals: Operationalizing Policies, Incident Response and Vendor Management

Sep. 12, 2018

Evolving Roles of Privacy and Security Professionals: Effective Governance and Board Reporting

Sep. 5, 2018

Evolving Roles of Privacy and Security Professionals: Examining Required Skills and Potential Convergence

Sep. 5, 2018

Twenty Steps Toward Achieving an Effective Social Media Policy

Sep. 5, 2018

How the GDPR Will Affect Private Funds’ Use of Alternative Data

Aug. 22, 2018

A Fund Manager’s Roadmap to Big Data: Privacy Concerns, Third Parties and Drones

Aug. 8, 2018

Essential Cyber, Tech and Privacy M&A Due Diligence Considerations

Aug. 8, 2018

A Fund Manager’s Roadmap to Big Data: Its Acquisition and Proper Use

Aug. 8, 2018

U.K.’s Cyber Essentials Provide a Window Into GDPR Security Infrastructure Requirements

Aug. 1, 2018

Staying Current With Geolocation Restrictions

Jul. 11, 2018

GDPR Essentials for the Financial Sector: Benchmarking and Assessing the Risks (Part One of Three)

Jul. 18, 2018

GDPR Essentials for the Financial Sector: Compliance Steps (Part Two of Three)

Jul. 25, 2018

Implications of the Supreme Court’s Carpenter Decision on the Treatment of Cellphone Location Records

Jul. 25, 2018

GDPR Essentials for the Financial Sector: Staying Compliant and Special Challenges (Part Three of Three)

Jul. 18, 2018

What to Expect From California’s Expansive Privacy Legislation

Jul. 18, 2018

Overcoming Barriers to Cross-Border Data Flows, Contract Provisions and Other Digital Transformation Issues

Jun. 27, 2018

What Are the GDPR’s Implications for Alternative Investment Managers? (Part Two of Two)

Jun. 20, 2018

What Are the GDPR’s Implications for Alternative Investment Managers? (Part One of Two)

Jun. 6, 2018

Beyond GDPR: The E.U.’s Expanding Cybersecurity Regime

Jun. 6, 2018

Analyzing New and Amended State Breach Notification Laws

May 30, 2018

Understanding the Intersection of Law and Artificial Intelligence

May 16, 2018

How to Ensure GDPR-Compliant Third-Party Relationships

May 16, 2018

Countdown to GDPR Enforcement: Final Steps and Looking Ahead

May 16, 2018

Crafting a Multinational Employer Social Media Policy After Cambridge Analytica

May 9, 2018

Building a Customer Privacy Program: Lessons from Dupont’s Privacy Leaders

May 9, 2018

The Right to Be Forgotten: English High Court Details When Google Must Delist Links to Crimes

May 2, 2018

Direct From the Irish Data Commissioner: GDPR Enforcement Priorities (Part Two of Two)

Apr. 25, 2018

Direct From the Irish Data Protection Commissioner: Supervising Facebook (Part One of Two)

Apr. 18, 2018

Ten Common Post-Breach Public Relations Failures and How to Avoid Them

Apr. 11, 2018

Breaking the Cloud: CLOUD Act Brings Data Held Overseas Under U.S. Jurisdiction

Mar. 28, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: It Starts With Governance (Part One of Three)

Mar. 28, 2018

Singapore Focuses on Critical Infrastructure With New Cybersecurity Law

Mar. 28, 2018

Evaluating Cybersecurity Coverage in Light of the GDPR

Mar. 28, 2018

EY Global Data Analytics Survey Finds Lack of GDPR Preparedness and Need for Cross-Functional Collaboration

Mar. 14, 2018

How Will the GDPR Affect Due Diligence?

Mar. 14, 2018

FTC Enters Into Stiff Settlement With PayPal for Venmo’s Deceptive Practices, but Eases up on a 2009 Sears Order 

Feb. 28, 2018

Financial Firms Must Supervise Their IT Providers to Avoid CFTC Enforcement Action

Feb. 28, 2018

The GDPR’s Data Subject Rights and Why They Matter

Jan. 31, 2018

Lessons and Trends From FTC’s 2017 Privacy and Data Security Update: Enforcement Actions (Part One of Two)

Feb. 14, 2018

Dynamic Regulations and Shareholder Actions Guide the Board’s Shifting Role in Cyber (Part Two of Two)

Feb. 14, 2018

NY AG and HHS Flex Regulatory Muscles in Recent Protected Health Information Breach Settlements

Feb. 14, 2018

Using Technology to Comply With the GDPR

Oct. 14, 2015

Privacy and Data Security Considerations for Life Sciences and Health Technology Companies (Part One of Two)

Jan. 31, 2018

Dynamic Regulations and Shareholder Actions Guide the Board’s Shifting Role in Cyber (Part One of Two)

Jan. 31, 2018

How to Make the Most of Limited Compliance Resources

Jan. 31, 2018

Biometric Data Protection Laws and Litigation Strategies (Part One of Two)

Jan. 17, 2018

A Practical Look at the GDPR’s Data Breach Notification Provision 

Apr. 5, 2017

Effective and Compliant Employee Monitoring (Part One of Two) 

Dec. 20, 2017

How to Make the Most of Limited Resources When Planning the Compliance Budget

Dec. 20, 2017

Five Months Until GDPR Enforcement: Addressing Tricky Questions and Answers

Dec. 20, 2017

Benchmarking Employee Monitoring Policies for Practical Approaches

Dec. 6, 2017

Actions Under Biometric Privacy Laws Highlight Related Risks

Nov. 8, 2017

E.U. Data Regulators Weigh in on GDPR Prep in Asia and Across the Globe

Nov. 8, 2017

Managing Data Privacy Across Multiple Jurisdictions

Oct. 25, 2017

Privacy Shield Survives First Annual Review

Sep. 27, 2017

Lessons From the Equifax Breach on How to Bolster Incident Response Planning (Part One of Two)

Oct. 11, 2017

Reconciling Data Localization Laws and the Global Flow of Information

Oct. 11, 2017

Lessons From the Equifax Breach on How to Bolster Incident Response Planning (Part Two of Two)

Oct. 11, 2017

FTC Launches Stick With Security Series, Adding Detail and Guidance to Its Start With Security Guide (Part Two of Two)

Sep. 27, 2017

FTC Settlements in Privacy Shield Cases and With Lenovo Over Use of “Man-in-the-Middle” Software Highlight Vigorous Enforcement Efforts

Sep. 27, 2017

New Criteria for Employee Monitoring Practices in Light of ECHR Decision

Sep. 27, 2017

Audit of Websites’ Security, Privacy and Consumer Practices Reveals Deficiencies Despite Overall Progress

Sep. 13, 2017

Focus on Children’s Privacy by FTC and Plaintiffs Calls for Prioritizing COPPA

Sep. 13, 2017

Tips and Warnings for Fund Managers When Navigating the Big Data Minefield

Jul. 20, 2016

Key Requirements of the Newly Approved Privacy Shield

Aug. 23, 2017

Tips From Google, Chase and P&G Privacy Officers on Developing Strong Privacy Leadership and When to Use Outside Counsel

Aug. 23, 2017

Uber Settlement Highlights Benefits of a Privacy Impact Assessment

Aug. 23, 2017

Implications and Analysis of the E.U.-Canada Data Sharing Agreement Rejection

Jan. 20, 2016

The E.U.’s New Rules: Latham & Watkins Partner Gail Crawford Discusses the Network Information Security Directive and the General Data Protection Regulation

Feb. 22, 2017

Lessons for Connected Devices From the FTC’s Warning Against Unexpected Data Collection 

Jul. 26, 2017

Best Practices for Managing the Risks of Big Data and Web Scraping

Jul. 26, 2017

International Law Playing Cybersecurity Catch-Up (Part Two of Two)

May 31, 2017

One Year Until GDPR Enforcement: Five Steps Companies Should Take Now

May 31, 2017

Using Big Data Legally and Ethically While Leveraging Its Value (Part Two of Two)

May 17, 2017

Advice From CPOs on Nurturing Privacy Programs on Any Budget

May 17, 2017

Using Big Data Legally and Ethically While Leveraging Its Value (Part One of Two)

May 17, 2017

Tracking Data and Maximizing Its Potential

May 3, 2017

European Data Protection Supervisor Offers Advice on Privacy Shield Review and GDPR Preparation

May 3, 2017

Practical and Innovative Permissioning Within the Framework of Europe’s Upcoming Data Protection Regulations

Apr. 19, 2017

Effective and Compliant Employee Monitoring (Part Two of Two)

Apr. 5, 2017

A Discussion With Ireland’s Data Protection Commissioner Helen Dixon About GDPR Compliance Strategies (Part Two of Two)

Apr. 5, 2017

Best Practices for Mitigating Compliance Risks When Investment Advisers Use Social Media 

Mar. 22, 2017

A Discussion With Ireland’s Data Protection Commissioner Helen Dixon About GDPR Compliance Strategies (Part One of Two)

Mar. 22, 2017

Understanding Online Advertising Technology and the Pipeline Process 

Mar. 22, 2017

What It Takes to Establish Compliant Social Media Policies for the Workplace

Feb. 22, 2017

Marsh and FireEye Take the Pulse of European Cybersecurity Climate

Feb. 8, 2017

Getting to Know the DPO and How to Adapt Corporate Structure to Comply With GDPR Requirements for the Role (Part Two of Two)

Jan. 25, 2017

Tracking Consumer Data: DAA Guidance Applies Core Principles to Cross-Device Technology

Jan. 25, 2017

FTC Data Security Enforcement Year-In-Review: Do We Know What “Reasonable” Security Is Yet?

Jan. 25, 2017

Getting to Know the DPO and Adapting Corporate Structure to Comply With the GDPR (Part One of Two)

Jan. 11, 2017

Ten Cybersecurity Priorities for 2017

Jan. 11, 2017

Privacy, Security Risks and Applicable Regulatory Regimes of Smart TVs

Jan. 11, 2017

FTC Priorities for 2017 and Beyond

Dec. 14, 2016

Navigating Data Privacy Laws in Cross-Border Investigations

Dec. 14, 2016

Advice From Compliance Officers on Getting the C-Suite to Show You the Money for Your Data Privacy Program

Nov. 30, 2016

How to Respond to Law Enforcement Demands for Geolocation Data and Data Stored Abroad

Nov. 2, 2016

Guide to Getting Your Security Program Certified Under ISO 27001

Nov. 2, 2016

Navigating the Early Months of Privacy Shield Certification Amidst Uncertainty

Oct. 5, 2016

Examining Newly Released Privacy and Security Guidance for the Fast-Driving Development of Autonomous Cars

Oct. 19, 2016

Privacy Leaders Share Key Considerations for Incorporating a Privacy Policy in the Corporate Culture 

Sep. 21, 2016

Staying Cybersecure Without Mobile Device Management

Sep. 7, 2016

Lessons From Consumer Challenges to Email Review Practices

Sep. 7, 2016

Survey Reveals What Keeps Consumers Away From Connectivity and How to Address Their Concerns 

Aug. 24, 2016

How GE’s Global CPO Approaches Shifting Regulations With Dynamic Implications 

Aug. 24, 2016

Maximizing the Benefits of Big Data Within Permissible Bounds 

Aug. 3, 2016

Second Circuit Quashes Warrant for Microsoft to Produce Email Content Stored Overseas 

Aug. 3, 2016

Is Pokémon Go Pushing the Bounds of Mobile App Privacy and Security?

Jul. 20, 2016

Challenges Facing Chief Privacy Officers

Jul. 20, 2016

Using Data Analytics to Combat Internal Cyber Threats

Jul. 6, 2016

How Will Brexit Affect U.K. Data Protection and Privacy Laws?

Jul. 6, 2016

Enforcing Consumer Consent: FTC Focuses on Location Tracking and Children’s Privacy

May 11, 2016

SEC Teaches Broker-Dealer a Lesson About Keeping Business Emails Secure

May 11, 2016

When Do Consumers Have Standing to Sue Over Data Breaches?

May 11, 2016

Privacy Concerns in a Cashless Society

Apr. 27, 2016

Mitigating the Risks of Using Social Media in the Workplace

Apr. 27, 2016

Designing Privacy Policies for Products and Devices in the Internet of Things

Apr. 27, 2016

A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: From Data Mapping to Evaluation (Part One of Three)

Apr. 13, 2016

The Regulators’ View of Best Practices for Social Media and Mobile Apps

Apr. 13, 2016

Securing Connected Medical Devices to Ensure Regulatory Compliance and Customer Safety (Part Two of Two)

Apr. 13, 2016

Ten Steps to Minimize Data Privacy and Security Risk and Maximize Compliance

Apr. 13, 2016

Study Analyzes How Companies Can Overcome Cybersecurity Challenges and Create Business Value

Mar. 16, 2016

CSIS’ James Lewis Discusses Balancing Law Enforcement and Privacy

Mar. 16, 2016

FCC Flexes Its Muscles With Proposed Broadband Privacy Rules and Verizon Settlement

Mar. 16, 2016

Making Sense of Cybersecurity and Privacy Developments in the E.U.

Mar. 2, 2016

Implementing a Privacy by Design Program to Protect Corporate and Consumer Information

Feb. 17, 2016

Deal Struck to Maintain the Transatlantic Data Flow 

Feb. 17, 2016

Legal and Regulatory Expectations for Mobile Device Privacy and Security (Part Two of Two)

Feb. 3, 2016

Germany Eases Restrictions on Certain Privacy Class Actions

Feb. 3, 2016

Legal and Regulatory Expectations for Mobile Device Privacy and Security (Part One of Two)

Feb. 3, 2016

The FTC’s Big Data Report Helps Companies Maximize Benefits While Staying Compliant

Feb. 3, 2016

Safe Harbor 2.0 Agreement Reached

Jan. 6, 2016

How the Financial Services Sector Can Meet the Cybersecurity Challenge: A Plan for Building a Cyber-Compliance Program (Part Two of Two)

Jan. 6, 2016

FTC Director Analyzes Its Most Significant 2015 Cyber Cases and Provides a Sneak Peek Into 2016

Jan. 6, 2016

Keeping Up with Technology and Regulatory Changes in Online Advertising to Mitigate Risks

Dec. 9, 2015

The Multifaceted Role of In-House Counsel in Cybersecurity 

Dec. 9, 2015

Avoiding Privacy Pitfalls While Using Social Media for Internal Investigations

Nov. 25, 2015

FTC Chair Addresses the Agency’s Data Privacy Concerns with Cross-Device Tracking

Nov. 25, 2015

FTC Loses Its First Data Security Case 

Nov. 25, 2015

Implementing an Effective Cloud Service Provider Compliance Program

Nov. 11, 2015

California Law Enforcement Faces Higher Bar in Acquiring Electronic Information

Nov. 11, 2015

How to Reduce Cybersecurity Risks of Bring Your Own Device Policies (Part Two of Two)

Oct. 28, 2015

Federal Courts Offer a Modern Interpretation of the VHS-Era Video Privacy Protection Act

Oct. 28, 2015

Privacy and Data Security Considerations for Life Sciences and Health Technology Companies (Part Two of Two)

Oct. 14, 2015

Dangerous Harbor: Analyzing the European Court of Justice Ruling

Oct. 14, 2015

Eight Ways Compliance Officers Can Build Relationships With the “Middle”

Oct. 14, 2015

How to Reduce the Cybersecurity Risks of Bring Your Own Device Policies (Part One of Two)

Sep. 16, 2015

The Tension Between Interest-Based Advertising and Data Privacy

Sep. 16, 2015

Examining Evolving Legal Ethics in the Age of the Cloud, Mobile Devices and Social Media (Part Two of Two)  

Aug. 12, 2015

How the Hospitality Industry Confronts Cybersecurity Threats that Never Take Vacations

Aug. 12, 2015

Surveys Find Internal and Third-Party Cybersecurity Risks Among Top Executive Concerns

Aug. 12, 2015

Navigating the Evolving Mobile Arena Landscape (Part Two of Two)

Jul. 29, 2015

Managing the Increased Individual Risks and Responsibilities of Compliance Officers

Jul. 29, 2015

How to Secure Evolving Mobile Technology and the Data It Collects (Part One of Two)

Jul. 29, 2015

Canada’s Digital Privacy Act: What Businesses Need to Know

Jul. 15, 2015

Understanding and Mitigating Liability Under the Children’s Online Privacy Protection Act

Jul. 1, 2015

What Companies Need to Know About the FCC’s Actions Against Unwanted Calls and Texts

Jul. 1, 2015

Coordinating Legal and Security Teams in the Current Cybersecurity Landscape (Part One of Two)

May 20, 2015

Establishing Strong Cybersecurity and Data Privacy Leadership: The Roles of the Chief Information Security Officer and Chief Privacy Officer (Part Two of Two)

May 20, 2015

Tackling Privacy and Cybersecurity Challenges While Fostering Innovation in the Internet of Things

May 6, 2015

Top Private Practitioners and Public Officials Detail Hot Topics in Cybersecurity and Best Practices for Government Investigations

Apr. 22, 2015

FCC Makes Its Mark on Cybersecurity Enforcement with Record Data Breach Settlement

Apr. 8, 2015

The SEC’s Two Primary Theories in Cybersecurity Enforcement Actions

Apr. 8, 2015

Strategies for Preventing and Handling Cybersecurity Threats from Employees

Apr. 8, 2015

Ten Actions for Effective Data Risk Management

Mar. 5, 2025

Navigating Evolving Mobile App Privacy Issues

Feb. 5, 2025

How the 2025 Cybersecurity Executive Order Affects Business

Oct. 9, 2024

Emojis and Video Communications: Compliance Practices to Overcome Recordkeeping Challenges

Oct. 2, 2024

Emojis and Video Communications: The Next Frontier of SEC Scrutiny?

Sep. 18, 2024

SEC Penalizes Adviser for Failing to Preserve Off-Channel Communications

Apr. 10, 2024

Latest SEC Sweep of Off‑Channel Communications Both Befuddles and Turns Up the Heat on Investment Advisers

Apr. 3, 2024

Crafting Effective Mobile Device Policies to Satisfy Regulatory Expectations

Feb. 28, 2024

Legal and Ethical Issues in Use of Biometrics: FIDO, Identity-Proofing and Other Options

Feb. 21, 2024

Legal and Ethical Issues in Use of Biometrics: Modality Selection, Implementation and State Laws

Dec. 6, 2023

U.K. Penalizes Morgan Stanley for Lax Electronic Communications Practices

Nov. 1, 2023

Compliance Challenges in Records Management

Sep. 20, 2023

SEC and CFTC Continue to Penalize Firms for Electronic Communications Recordkeeping Violations

Aug. 23, 2023

3. Location Data Series

Aug. 16, 2023

Recent Developments in SEC, DOJ and Civil Litigation Efforts Targeting Off-Channel Electronic Communications

Jul. 19, 2023

CJEU Decision Adds Antitrust Regulators As New GDPR Concern for Companies

Jul. 12, 2023

SEC Remains Focused on Off-Channel Communications

Jun. 21, 2023

Xbox and Alexa COPPA Case Lessons: Avatars, Biometrics and Other New Expectations

Jun. 14, 2023

Messaging Apps Come Under Increasing Regulatory Scrutiny

Jun. 14, 2023

Xbox and Alexa COPPA Case Lessons: Negotiating With the FTC Over Algorithms and Remedies

May 10, 2023

Aggressive Washington Health Privacy Law: Ten Compliance Priorities

Jan. 18, 2023

A Sensitive Time for Location Data: Tips to Address New Rules and Vendor Standards

Jan. 4, 2023

FTC and $391-Million State AG Case Put Location Data Enforcement on the Map

Nov. 30, 2022

Navigating Evolving Social Media Risks

Nov. 2, 2022

In New Proposal, E.U. Aims to Boost Security of Connected Devices

May 25, 2022

TV Privacy: Will the TV Industry Agree to Standardize Consent on Screen?

May 18, 2022

TV Privacy: Can Old Remotes Handle New Consent Requirements?

Mar. 9, 2022

Securing Emerging Technologies Without Hampering Innovation: Private Sector Challenges

Mar. 2, 2022

Blockchain Recordkeeping Stirs Privacy Concerns

May 19, 2021

Cybersecurity in a 5G World: Tackling the Challenges With Revised Strategies

May 12, 2021

Cybersecurity in a 5G World: Vulnerabilities and Challenges

Apr. 7, 2021

Did Clubhouse Sacrifice Privacy for Innovation? How to Find the Balance 

Jan. 13, 2021

Checklist for IoT Security Audits

Dec. 9, 2020

What the New IoT Act Means for the Private Sector

Nov. 4, 2020

A Guided Tour of Enterprise IoT Device Hazards

Oct. 7, 2020

How to Address Intensifying Enterprise IoT Security Risks

Aug. 12, 2020

Not Just TikTok: How Companies Can Mitigate Risk of Employee Social Media Use

Jul. 8, 2020

Privacy Compliant Return-to-Work Checklist

Jun. 24, 2020

Balancing Privacy Rights and Innovation in Digital Contact Tracing

May 27, 2020

How to Facilitate a Safe and Privacy Compliant Return to Work: Contact Tracing

Apr. 8, 2020

Wide-Ranging Lessons From Notable Breaches in Q1

Mar. 11, 2020

NIST’s New IoT Standard: Inspiring a Wave of New Device Security Guidance

Mar. 4, 2020

NIST’s New IoT Standard: Boosting Security As States Launch Laws

Dec. 18, 2019

FTC Spyware Takedown Highlights Employee Monitoring Privacy Shifts

Jul. 31, 2019

Takeaways From the U.K. ICO’s FaceApp Warning

Apr. 17, 2019

China Establishes Certification Scheme for Mobile App Operators

Apr. 10, 2019

Combatting Privacy Issues Arising From Geolocation Data Use: Five Risk-Mitigation Strategies

Apr. 3, 2019

Combatting Privacy Issues Arising From Geolocation Data Use: Understanding the Legal Landscape

Mar. 27, 2019

Companies May Need to Re-Examine Approach to Breach Response Preparedness, According to Experian Survey

Feb. 20, 2019

Fixing the Chinks in Companies’ Cyber Armor: Executives

Oct. 24, 2018

California Enacts Groundbreaking IoT Law and Requires Disclosure of Bot Use

Oct. 17, 2018

Risks and Rewards of Bluetooth Technology

Oct. 3, 2018

Insight on Addressing IoT Privacy Issues From IAPP’s Chief Knowledge Officer

Oct. 3, 2018

Lax Privacy Policies, Security Measures and Vendor Oversight Lead to FTC Settlement for Mobile Phone Manufacturer

May 16, 2018

Crafting a Multinational Employer Social Media Policy After Cambridge Analytica

Mar. 28, 2018

FTC Recommends Greater Transparency, Better Recordkeeping and Further Streamlining of Mobile Security Practices

Mar. 14, 2018

FTC Enters Into Stiff Settlement With PayPal for Venmo’s Deceptive Practices, but Eases up on a 2009 Sears Order 

Dec. 6, 2017

Chasing the Ideal Balance Between Security and Ease of Use: Is AI the Answer?

Nov. 8, 2017

How to Mitigate the Risks of Open-Source Software (Part Two of Two)

Nov. 8, 2017

Understanding and Using Bot Technology to Address Privacy and Security Challenges 

Oct. 11, 2017

FTC Launches Stick With Security Series, Adding Detail and Guidance to Its Start With Security Guide (Part Two of Two)

Oct. 11, 2017

Creating Tomorrow’s Code, Today: Designing an Effective Mobile-First Code of Conduct

Feb. 22, 2017

Lessons for Connected Devices From the FTC’s Warning Against Unexpected Data Collection 

Apr. 19, 2017

The Wisdom of Planning Ahead: The Duty to Preserve Backup Tapes, Mobile Devices and Instant Messages

Jan. 25, 2017

Tracking Consumer Data: DAA Guidance Applies Core Principles to Cross-Device Technology

Jan. 11, 2017

Privacy, Security Risks and Applicable Regulatory Regimes of Smart TVs

Jan. 11, 2017

FTC Priorities for 2017 and Beyond

Dec. 14, 2016

Presidential Commission Recommends Ways For Public and Private Sectors to Improve Cybersecurity 

Nov. 30, 2016

New NIST and DHS IoT Guidance Signal Regulatory Growth 

Nov. 2, 2016

How to Protect Against Weaponized Devices in Light of the Massive Denial-of-Service Attack

Oct. 5, 2016

Examining Newly Released Privacy and Security Guidance for the Fast-Driving Development of Autonomous Cars

Oct. 19, 2016

Finding the Best Ways to Secure Digital Transactions in a Mobile World 

Sep. 21, 2016

Staying Cybersecure Without Mobile Device Management

Aug. 3, 2016

Is Pokémon Go Pushing the Bounds of Mobile App Privacy and Security?

Jun. 8, 2016

Securing the Connected Car: Privacy, Security and Self-Regulation

May 11, 2016

Managing Risk for the Internet of Things in the Current Regulatory Landscape

Apr. 27, 2016

Designing Privacy Policies for Products and Devices in the Internet of Things

Apr. 13, 2016

The Regulators’ View of Best Practices for Social Media and Mobile Apps

Apr. 13, 2016

Securing Connected Medical Devices to Ensure Regulatory Compliance and Customer Safety (Part Two of Two)

Mar. 30, 2016

Securing Connected Medical Devices to Ensure Regulatory Compliance and Customer Safety (Part One of Two)

Feb. 17, 2016

Legal and Regulatory Expectations for Mobile Device Privacy and Security (Part Two of Two)

Feb. 3, 2016

Legal and Regulatory Expectations for Mobile Device Privacy and Security (Part One of Two)

Jan. 6, 2016

Keeping Up with Technology and Regulatory Changes in Online Advertising to Mitigate Risks

Jan. 6, 2016

FTC Director Analyzes Its Most Significant 2015 Cyber Cases and Provides a Sneak Peek Into 2016

Nov. 11, 2015

How to Reduce Cybersecurity Risks of Bring Your Own Device Policies (Part Two of Two)

Oct. 28, 2015

Privacy and Data Security Considerations for Life Sciences and Health Technology Companies (Part Two of Two)

Oct. 14, 2015

Mastercard and U.S. Bancorp Execs Share Tips for Awareness and Prevention of Mushrooming Cyber Risk (Part One of Two)

Oct. 14, 2015

How to Reduce the Cybersecurity Risks of Bring Your Own Device Policies (Part One of Two)

Aug. 26, 2015

Examining Evolving Legal Ethics in the Age of the Cloud, Mobile Devices and Social Media (Part One of Two)

Aug. 12, 2015

Navigating the Evolving Mobile Arena Landscape (Part Two of Two)

Jul. 29, 2015

How to Secure Evolving Mobile Technology and the Data It Collects (Part One of Two)

May 20, 2015

Tackling Privacy and Cybersecurity Challenges While Fostering Innovation in the Internet of Things

Most-Read Articles

  • Apr. 16, 2025
    Sale of 23andMe’s Genetic Data: Implications of the Motions for a Privacy Ombudsman and State Laws
    • Data Privacy Litigation
  • Apr. 16, 2025
    Checklist for AI Procurement
    • Artificial Intelligence
  • May 7, 2025
    DOJ Guidance on Bulk Sensitive Data Rules: Enforcement Grace Period and Prohibited Transactions
    • DOJ Enforcement
  • Feb. 12, 2025
    AI Governance: Striking the Balance Between Innovation, Ethics and Accountability
    • Artificial Intelligence
  • Apr. 30, 2025
    Connecticut AG’s Report Reveals Privacy Enforcers Reaching Deeper Into Their State Laws
    • State Laws

Women to Watch: Contributions, Achievements and Observations of Outstanding Female Professionals

To mark International Women’s Day, women editors and reporters at ION Analytics interviewed outstanding women in the industries and jurisdictions we cover. In this part, Law Report Group editors Jill Abitbol, Robin L. Barton and Megan Zwiebel profile notable women in data privacy, cybersecurity, private funds and anti-corruption law, including Anne-Gabrielle Haie, Jessica Lee, Micaela McMurrough, Laura Perkins, Amanda Raad, Madelyn Calabrese, Ranah Esmaili and Genna Garver. Enjoy reading their inspiring remarks here.


Celebrating Data Privacy Day 2025

Read the full brief here.


Cybersecurity Awareness Month

Read the full brief here.


Spotlight on Trailblazing Women

To mark International Women’s Day 2024, women editors and reporters of ION Analytics interviewed outstanding women in the industries and jurisdictions we cover. In this part, Jill Abitbol, Managing Editor of the Cybersecurity Law Report and Anti-Corruption Report, features notable women in data privacy, cybersecurity, white collar defense, compliance and anti-corruption law, including Christina Montgomery, Leslie Shanklin, Palmina Fava, Alexandra Ross and Lucinda Low. Enjoy reading their inspiring remarks here.


We Celebrate Data Privacy Day 2024

Read the full brief here.


Spotlight on Trailblazing Women

In honor of International Women’s Day, some of ION Analytics' editorial teams led by women interviewed notable women in the markets and industries we cover. In this part, the Cybersecurity Law Report highlighted notable women in compliance and hedge fund, data privacy and cybersecurity, and anti-corruption law, including Amii Barnard-Bahn, Abigail Bell, Genna Garver, Jane Horvath, Barbara Li, Amy Mushahwar, Mara Senn and Carol Widger. The interviews are here.

 


 

 


Webinar on Compliant International Data Transfers

Listen here to our discussion with our colleagues at Ethos Privacy, which took place on March 1, 2022, on how to approach international data transfer challenges. 


Webinar on Getting a Handle on Vendor Contracts

A recording of the March 10 webinar can be accessed here. 


Cybersecurity Resolutions for 2021

In this quick take video, we talk about some of our cybersecurity resolutions for 2021.


Facial Recognition Concerns

In this short video, we discuss the privacy and bias concerns with facial recognition technology.


Planning for the Return to Work 

We discuss a few return-to-work privacy issues in this short video.


ACR and CSLR Spring Update 2020

The Senior Editors of the Anti-Corruption Report and the Cybersecurity Law Report recently teamed up to present an update on the trends and hot topics in the anti-corruption, cybersecurity and data privacy spaces since the beginning of the year and what the publications will be focusing on in the coming months. A complimentary download of the webinar is available here.


Upcoming Webinar: Companywide Work From Home - Cybersecurity and Privacy Best Practices

Please join us on Monday, March 23, 2020, from 12:00 p.m.- 12:30 p.m. EDT for a complimentary webinar discussing the cybersecurity and privacy challenges the shift to remote working has created and how to overcome them. Registration information for the webinar is here. 


Upcoming Webinar to Explore Best Practices for Alternative Data Use

Please join us on Wednesday, January 15, 2020, at 11:00 a.m. EST for a complimentary webinar hosted by our sister publication, the Hedge Fund Law Report, discussing issues relating to the use of alternative data by private fund managers. To register for the webinar, click here.


Upcoming HFLR/CSLR Webinar to Explore Strategies and Tactics for Conducting an Effective Tabletop Exercise

Please join the Hedge Fund Law Report and the Cybersecurity Law Report on Tuesday, July 30, 2019, at 1:00 p.m. ET for a complimentary webinar discussing the strategies and tactics companies can employ to conduct an effective tabletop exercise. GCs and CCOs are encouraged to invite their CISOs and CTOs to join as well. The webinar will be moderated by Shaw Horton, Associate Editor of the Hedge Fund Law Report, and will feature Luke Dembosky, partner at Debevoise, John “Four” Flynn, chief information security officer at Uber, and Jill Abitbol, Senior Editor of the Cybersecurity Law Report. Registration for the webinar is available here.


Anti-Corruption Webinar: How HPE Is Using Its New T&E Tool to Generate Compliance Metrics

Measuring the effectiveness of a compliance program can be tricky, but some companies are finding ways to use their existing internal controls to generate useful data. Join our sister publication the Anti-Corruption Report (ACR) for a complimentary webinar that explores Hewlett Packard Enterprises’ new travel-and-entertainment-approval tool. On Wednesday, March 27, 2019, from 1:00 p.m. to 2:00 p.m. EDT, the ACR’s Megan Zwiebel will interview Becky Rohr, vice-president of anti-corruption and global trade at Hewlett Packard Enterprises, about how they are using their T&E tool to measure and improve compliance. Registration information is here.

  • Privacy Policy
  • Terms of Use
  • About Us

© 2025 Mergermarket Limited. All rights reserved.

Sign inFree trialForgot password ×

Sorry, we do not recognise the username and password combination you have entered.

Please ensure you have typed your email address correctly and remember that passwords are case sensitive.

You are logged into a maximum of three different browsers/devices.

Please log in with one previously used and go to My Account to manage the browsers/devices you are using.

Forgotten password? Request Details


Not a user? Get a free trial

Thank you.

A reset link has been sent to the email address provided.

Please be aware that the time taken for mail to be delivered is dependent upon your Internet Service Provider. It should normally arrive within 5-15 minutes.

Request Details

Sorry, this email address is not recognised on our system


Thank you, we'll contact you about your trial