Data Privacy
- Litigation
- Compliance
- Connected Devices
Mar. 20, 2024
Court Hands FTC Grounds to Curb Data Broker Sales
Mar. 22, 2023
ECJ Ruling Expands Legal Professional Privilege
Sep. 14, 2022
Shaping the BIPA Landscape: Avoiding Liability
Mar. 16, 2022
No End in Sight: Biometrics Litigation Trends
Jan. 19, 2022
Privacy Resolutions for 2022
Oct. 20, 2021
Collective Actions in the U.K. After Lloyd v. Google
Jun. 9, 2021
To “Cure” or Not to “Cure,” That Is the Question
Feb. 17, 2021
Big Questions for BIPA Case Law in 2021
Jun. 8, 2016
Minimizing Class Action Risk in Breach Response
Sep. 16, 2015
Privacy and Cybersecurity in Canada: Legal Risk Update
Oct. 2, 2024
How to Manage AI Procurement: Five Steps
Sep. 25, 2024
Practical Strategies for Effective Consent Management
Sep. 18, 2024
How to Manage AI Procurement: Leadership and Preparation
Sep. 4, 2024
Making the Business Case for Privacy
Aug. 7, 2024
How Privacy Efforts Can Boost Revenue
Jul. 3, 2024
2) Choosing Privacy Tech Solutions
Jul. 3, 2024
4) Navigating Tracking Technologies
May 15, 2024
New E.U. Directive Expands Scope of Due Diligence
Apr. 17, 2024
AI Governance Strategies for Privacy Pros
Apr. 3, 2024
Examining Utah’s Pioneering State AI Law
Mar. 20, 2024
AI Drives Rise in Private Funds’ Use of Alternative Data
Mar. 20, 2024
Court Hands FTC Grounds to Curb Data Broker Sales
Feb. 21, 2024
Tracking Technologies: A 360‑Degree Governance Plan
Jan. 31, 2024
Compliance 5.0: A Culture-Centered Approach
Nov. 8, 2023
Understanding the Growing Use of PETs
Nov. 1, 2023
Compliance Challenges in Records Management
Nov. 1, 2023
Checklist for Selecting Privacy Tech Solutions
Aug. 23, 2023
5. Xbox and Alexa COPPA Case Lessons Series
Aug. 16, 2023
Why Companies Unintentionally Fail to Honor Opt-Outs
Jul. 12, 2023
SEC Remains Focused on Off-Channel Communications
Jul. 5, 2023
A Roadmap to the Final Regulations Under the CPRA
Jun. 14, 2023
Messaging Apps Come Under Increasing Regulatory Scrutiny
May 31, 2023
Colorado Controllers: The Final (Rules’) Frontier
May 31, 2023
How CPOs Communicate Privacy’s Value to the Board
Mar. 15, 2023
A Roadmap to the Final Regulations Under the CPRA
Mar. 1, 2023
Getting Used to Zero Trust? Meet Zero Copy
Feb. 1, 2023
Key Privacy Issues for 2023
Nov. 30, 2022
Understanding and Implementing Privacy Audits
Nov. 30, 2022
Navigating Evolving Social Media Risks
Nov. 16, 2022
Compliance Checklist for Consumer and Employee DSARs
Nov. 9, 2022
Lessons From the Conviction of Uber’s Former CISO
Oct. 19, 2022
GM CCO Talks Data, Culture, ESG and Scope Creep
Sep. 28, 2022
Lessons From California’s First CCPA Enforcement Action
Sep. 14, 2022
Shaping the BIPA Landscape: Avoiding Liability
Jun. 1, 2022
FINRA Clarifies Stance on CCO Supervisory Liability
May 4, 2022
Effective Use of Privacy Impact Assessments
Mar. 23, 2022
Are “Privacy-First” Clean Rooms Safe From Regulators?
Mar. 2, 2022
Blockchain Recordkeeping Stirs Privacy Concerns
Feb. 16, 2022
The Privacy and Antitrust Paradox in the Age of Data
Jan. 19, 2022
Privacy Resolutions for 2022
Dec. 15, 2021
A Guide to Privacy Frameworks: Finding the Best Fit
Dec. 15, 2021
Understanding Differential Privacy
Dec. 8, 2021
A Guide to Privacy Frameworks: Examining Options
Nov. 17, 2021
Data Localization: Cybersecurity Challenges Abound
Nov. 3, 2021
Data Localization: Laws Spread and Enforcement Rises
Oct. 20, 2021
Collective Actions in the U.K. After Lloyd v. Google
Sep. 22, 2021
Jacki Cheslow on IEEE’s Remote Program Assessment
Jun. 23, 2021
Three Years In, GDPR Legal Landscape Remains in Flux
Jun. 16, 2021
Leveraging Policies and Culture: A Recipe for Success
Jun. 9, 2021
To “Cure” or Not to “Cure,” That Is the Question
Feb. 10, 2021
GDPR Lives On in the U.K. Post-Brexit
Jan. 20, 2021
Disputed Twitter Fine Offers Breach Response Lessons
Jan. 20, 2021
Privacy Resolutions for 2021
Jan. 13, 2021
Checklist for IoT Security Audits
Dec. 16, 2020
AI for Compliance: Building a Model
Nov. 11, 2020
AI for Compliance: Foundations
Nov. 4, 2020
A Guided Tour of Enterprise IoT Device Hazards
Sep. 9, 2020
Implementing the CCPA Regulations: Are You Ready?
Aug. 12, 2020
Navigating China’s Cybersecurity Regulatory Maze
Jun. 10, 2020
How Compliance Departments Are Responding to COVID‑19
Apr. 8, 2020
Wide-Ranging Lessons From Notable Breaches in Q1
Mar. 25, 2020
Gauging the GDPR’s Global Reach
Mar. 11, 2020
Privacy and Cyber Due Diligence in M&A Transactions
Feb. 12, 2020
Compliance Records Are a Strategic Gold Mine
Feb. 12, 2020
How to Approach CCPA’s Under-16 Opt‑in Consent
Jan. 29, 2020
30 Creative Ideas for Compliance Messaging
Dec. 11, 2019
How to Handle E.U. Data Subject Access Requests
Dec. 11, 2019
Not Just GDPR: Examining the Other European Privacy Laws
Oct. 2, 2019
Preserving Customer Goodwill After a Breach
Aug. 21, 2019
Examining Portugal’s GDPR Implementation Statute
Jul. 31, 2019
Learning From the Equifax Settlement
Jul. 17, 2019
Maine Enacts Sweeping Broadband Customer Privacy Law
Jul. 10, 2019
Can GDPR Hinder AI Made in Europe?
Jul. 3, 2019
Analyzing Early GDPR Enforcement
Jun. 19, 2019
Kids, Privacy & Legal Compliance
Feb. 6, 2019
Analyzing Early GDPR Enforcement: France
Jan. 30, 2019
Analyzing Early GDPR Enforcement: U.K. and Austria
Jan. 23, 2019
Analyzing Early GDPR Enforcement: Portugal and Germany
Dec. 19, 2018
Interim Response Lessons From the Marriott Breach
Nov. 7, 2018
How GoDaddy Built an Effective Privacy Program
Oct. 17, 2018
Regulating AI: U.S., E.U. and Industry Laws and Guidance
Aug. 1, 2018
Staying Current With Geolocation Restrictions
Mar. 28, 2018
Evaluating Cybersecurity Coverage in Light of the GDPR
Mar. 14, 2018
How Will the GDPR Affect Due Diligence?
Feb. 28, 2018
The GDPR’s Data Subject Rights and Why They Matter
Feb. 14, 2018
Using Technology to Comply With the GDPR
Jan. 31, 2018
How to Make the Most of Limited Compliance Resources
Nov. 8, 2017
Managing Data Privacy Across Multiple Jurisdictions
Oct. 25, 2017
Privacy Shield Survives First Annual Review
Jul. 20, 2016
Key Requirements of the Newly Approved Privacy Shield
May 17, 2017
Tracking Data and Maximizing Its Potential
Jan. 11, 2017
Ten Cybersecurity Priorities for 2017
Jan. 11, 2017
FTC Priorities for 2017 and Beyond
Sep. 21, 2016
Staying Cybersecure Without Mobile Device Management
Jul. 20, 2016
Using Data Analytics to Combat Internal Cyber Threats
Jul. 20, 2016
Challenges Facing Chief Privacy Officers
May 11, 2016
Privacy Concerns in a Cashless Society
Feb. 17, 2016
Deal Struck to Maintain the Transatlantic Data Flow
Feb. 3, 2016
Safe Harbor 2.0 Agreement Reached
Nov. 25, 2015
FTC Loses Its First Data Security Case
Apr. 8, 2015
Ten Actions for Effective Data Risk Management
Nov. 1, 2023
Compliance Challenges in Records Management
Aug. 23, 2023
3. Location Data Series
Jul. 12, 2023
SEC Remains Focused on Off-Channel Communications
Jun. 14, 2023
Messaging Apps Come Under Increasing Regulatory Scrutiny
Nov. 30, 2022
Navigating Evolving Social Media Risks
Mar. 2, 2022
Blockchain Recordkeeping Stirs Privacy Concerns
Jan. 13, 2021
Checklist for IoT Security Audits
Dec. 9, 2020
What the New IoT Act Means for the Private Sector
Nov. 4, 2020
A Guided Tour of Enterprise IoT Device Hazards
Jul. 8, 2020
Privacy Compliant Return-to-Work Checklist
Apr. 8, 2020
Wide-Ranging Lessons From Notable Breaches in Q1
Jul. 31, 2019
Takeaways From the U.K. ICO’s FaceApp Warning
Feb. 20, 2019
Fixing the Chinks in Companies’ Cyber Armor: Executives
Oct. 17, 2018
Risks and Rewards of Bluetooth Technology
Jan. 11, 2017
FTC Priorities for 2017 and Beyond
Nov. 30, 2016
New NIST and DHS IoT Guidance Signal Regulatory Growth
Sep. 21, 2016
Staying Cybersecure Without Mobile Device Management
Most-Read Articles
-
Sep. 4, 2024
Navigating Government Investigations of Privacy Practices -
Sep. 4, 2024
Cybersecurity Obligations in E.U.’s Digital Laws: AI Act, CRA and NIS2 -
Sep. 18, 2024
How to Manage AI Procurement: Leadership and Preparation -
Sep. 18, 2024
FTC Signals Stricter Children’s Enforcement in NGL Labs Settlement: Key Violations and Settlement Terms -
Oct. 2, 2024
How to Manage AI Procurement: Five Steps
Spotlight on Trailblazing Women
To mark International Women’s Day 2024, women editors and reporters of ION Analytics interviewed outstanding women in the industries and jurisdictions we cover. In this part, Jill Abitbol, Managing Editor of the Cybersecurity Law Report and Anti-Corruption Report, features notable women in data privacy, cybersecurity, white collar defense, compliance and anti-corruption law, including Christina Montgomery, Leslie Shanklin, Palmina Fava, Alexandra Ross and Lucinda Low. Enjoy reading their inspiring remarks here.
We Celebrate Data Privacy Day 2024
Read the full brief here.
Spotlight on Trailblazing Women
In honor of International Women’s Day, some of ION Analytics' editorial teams led by women interviewed notable women in the markets and industries we cover. In this part, the Cybersecurity Law Report highlighted notable women in compliance and hedge fund, data privacy and cybersecurity, and anti-corruption law, including Amii Barnard-Bahn, Abigail Bell, Genna Garver, Jane Horvath, Barbara Li, Amy Mushahwar, Mara Senn and Carol Widger. The interviews are here.
Webinar on Compliant International Data Transfers
Listen here to our discussion with our colleagues at Ethos Privacy, which took place on March 1, 2022, on how to approach international data transfer challenges.
Webinar on Getting a Handle on Vendor Contracts
A recording of the March 10 webinar can be accessed here.
Cybersecurity Resolutions for 2021
In this quick take video, we talk about some of our cybersecurity resolutions for 2021.
Facial Recognition Concerns
In this short video, we discuss the privacy and bias concerns with facial recognition technology.
ACR and CSLR Spring Update 2020
The Senior Editors of the Anti-Corruption Report and the Cybersecurity Law Report recently teamed up to present an update on the trends and hot topics in the anti-corruption, cybersecurity and data privacy spaces since the beginning of the year and what the publications will be focusing on in the coming months. A complimentary download of the webinar is available here.
Upcoming Webinar: Companywide Work From Home - Cybersecurity and Privacy Best Practices
Please join us on Monday, March 23, 2020, from 12:00 p.m.- 12:30 p.m. EDT for a complimentary webinar discussing the cybersecurity and privacy challenges the shift to remote working has created and how to overcome them. Registration information for the webinar is here.
Upcoming Webinar to Explore Best Practices for Alternative Data Use
Please join us on Wednesday, January 15, 2020, at 11:00 a.m. EST for a complimentary webinar hosted by our sister publication, the Hedge Fund Law Report, discussing issues relating to the use of alternative data by private fund managers. To register for the webinar, click here.
Upcoming HFLR/CSLR Webinar to Explore Strategies and Tactics for Conducting an Effective Tabletop Exercise
Please join the Hedge Fund Law Report and the Cybersecurity Law Report on Tuesday, July 30, 2019, at 1:00 p.m. ET for a complimentary webinar discussing the strategies and tactics companies can employ to conduct an effective tabletop exercise. GCs and CCOs are encouraged to invite their CISOs and CTOs to join as well. The webinar will be moderated by Shaw Horton, Associate Editor of the Hedge Fund Law Report, and will feature Luke Dembosky, partner at Debevoise, John “Four” Flynn, chief information security officer at Uber, and Jill Abitbol, Senior Editor of the Cybersecurity Law Report. Registration for the webinar is available here.
Anti-Corruption Webinar: How HPE Is Using Its New T&E Tool to Generate Compliance Metrics
Measuring the effectiveness of a compliance program can be tricky, but some companies are finding ways to use their existing internal controls to generate useful data. Join our sister publication the Anti-Corruption Report (ACR) for a complimentary webinar that explores Hewlett Packard Enterprises’ new travel-and-entertainment-approval tool. On Wednesday, March 27, 2019, from 1:00 p.m. to 2:00 p.m. EDT, the ACR’s Megan Zwiebel will interview Becky Rohr, vice-president of anti-corruption and global trade at Hewlett Packard Enterprises, about how they are using their T&E tool to measure and improve compliance. Registration information is here.