Data Privacy
- Litigation
- Compliance
- Connected Devices
Mar. 22, 2023
ECJ Ruling Expands Legal Professional Privilege
Sep. 14, 2022
Shaping the BIPA Landscape: Avoiding Liability
Mar. 16, 2022
No End in Sight: Biometrics Litigation Trends
Jan. 19, 2022
Privacy Resolutions for 2022
Oct. 20, 2021
Collective Actions in the U.K. After Lloyd v. Google
Jun. 9, 2021
To “Cure” or Not to “Cure,” That Is the Question
Feb. 17, 2021
Big Questions for BIPA Case Law in 2021
Jun. 8, 2016
Minimizing Class Action Risk in Breach Response
Sep. 16, 2015
Privacy and Cybersecurity in Canada: Legal Risk Update
May 31, 2023
Colorado Controllers: The Final (Rules’) Frontier
May 31, 2023
How CPOs Communicate Privacy’s Value to the Board
Mar. 15, 2023
A Roadmap to the Final Regulations Under the CPRA
Mar. 1, 2023
Getting Used to Zero Trust? Meet Zero Copy
Feb. 1, 2023
Key Privacy Issues for 2023
Nov. 30, 2022
Navigating Evolving Social Media Risks
Nov. 30, 2022
Understanding and Implementing Privacy Audits
Nov. 16, 2022
Compliance Checklist for Consumer and Employee DSARs
Nov. 9, 2022
Lessons From the Conviction of Uber’s Former CISO
Oct. 19, 2022
GM CCO Talks Data, Culture, ESG and Scope Creep
Sep. 28, 2022
Lessons From California’s First CCPA Enforcement Action
Sep. 14, 2022
Shaping the BIPA Landscape: Avoiding Liability
Jun. 1, 2022
FINRA Clarifies Stance on CCO Supervisory Liability
May 4, 2022
Effective Use of Privacy Impact Assessments
Mar. 23, 2022
Are “Privacy-First” Clean Rooms Safe From Regulators?
Mar. 2, 2022
Blockchain Recordkeeping Stirs Privacy Concerns
Feb. 16, 2022
The Privacy and Antitrust Paradox in the Age of Data
Jan. 19, 2022
Privacy Resolutions for 2022
Dec. 15, 2021
A Guide to Privacy Frameworks: Finding the Best Fit
Dec. 15, 2021
Understanding Differential Privacy
Dec. 8, 2021
A Guide to Privacy Frameworks: Examining Options
Nov. 17, 2021
Data Localization: Cybersecurity Challenges Abound
Nov. 3, 2021
Data Localization: Laws Spread and Enforcement Rises
Oct. 20, 2021
Collective Actions in the U.K. After Lloyd v. Google
Sep. 22, 2021
Jacki Cheslow on IEEE’s Remote Program Assessment
Jun. 23, 2021
Three Years In, GDPR Legal Landscape Remains in Flux
Jun. 16, 2021
Leveraging Policies and Culture: A Recipe for Success
Jun. 9, 2021
To “Cure” or Not to “Cure,” That Is the Question
Feb. 10, 2021
GDPR Lives On in the U.K. Post-Brexit
Jan. 20, 2021
Privacy Resolutions for 2021
Jan. 20, 2021
Disputed Twitter Fine Offers Breach Response Lessons
Jan. 13, 2021
Checklist for IoT Security Audits
Dec. 16, 2020
AI for Compliance: Building a Model
Nov. 11, 2020
AI for Compliance: Foundations
Nov. 4, 2020
A Guided Tour of Enterprise IoT Device Hazards
Sep. 9, 2020
Implementing the CCPA Regulations: Are You Ready?
Aug. 12, 2020
Navigating China’s Cybersecurity Regulatory Maze
Jun. 10, 2020
How Compliance Departments Are Responding to COVID‑19
Apr. 8, 2020
Wide-Ranging Lessons From Notable Breaches in Q1
Mar. 25, 2020
Gauging the GDPR’s Global Reach
Mar. 11, 2020
Privacy and Cyber Due Diligence in M&A Transactions
Feb. 12, 2020
Compliance Records Are a Strategic Gold Mine
Feb. 12, 2020
How to Approach CCPA’s Under-16 Opt-In Consent
Jan. 29, 2020
30 Creative Ideas for Compliance Messaging
Dec. 11, 2019
Not Just GDPR: Examining the Other European Privacy Laws
Dec. 11, 2019
How to Handle E.U. Data Subject Access Requests
Oct. 2, 2019
Preserving Customer Goodwill After a Breach
Aug. 21, 2019
Examining Portugal’s GDPR Implementation Statute
Jul. 31, 2019
Learning From the Equifax Settlement
Jul. 17, 2019
Maine Enacts Sweeping Broadband Customer Privacy Law
Jul. 10, 2019
Can GDPR Hinder AI Made in Europe?
Jun. 19, 2019
Kids, Privacy & Legal Compliance
Feb. 6, 2019
Analyzing Early GDPR Enforcement: France
Jan. 30, 2019
Analyzing Early GDPR Enforcement: U.K. and Austria
Jan. 23, 2019
Analyzing Early GDPR Enforcement: Portugal and Germany
Dec. 19, 2018
Interim Response Lessons From the Marriott Breach
Nov. 7, 2018
How GoDaddy Built an Effective Privacy Program
Oct. 17, 2018
Regulating AI: U.S., E.U. and Industry Laws and Guidance
Aug. 1, 2018
Staying Current With Geolocation Restrictions
Mar. 28, 2018
Evaluating Cybersecurity Coverage in Light of the GDPR
Mar. 14, 2018
How Will the GDPR Affect Due Diligence?
Feb. 28, 2018
The GDPR’s Data Subject Rights and Why They Matter
Feb. 14, 2018
Using Technology to Comply With the GDPR
Nov. 8, 2017
Managing Data Privacy Across Multiple Jurisdictions
Oct. 25, 2017
Privacy Shield Survives First Annual Review
May 17, 2017
Tracking Data and Maximizing Its Potential
Jan. 11, 2017
FTC Priorities for 2017 and Beyond
Jan. 11, 2017
Ten Cybersecurity Priorities for 2017
Sep. 21, 2016
Staying Cybersecure Without Mobile Device Management
Jul. 20, 2016
Key Requirements of the Newly Approved Privacy Shield
Jul. 20, 2016
Challenges Facing Chief Privacy Officers
Jul. 20, 2016
Using Data Analytics to Combat Internal Cyber Threats
May 11, 2016
Privacy Concerns in a Cashless Society
Feb. 17, 2016
Deal Struck to Maintain the Transatlantic Data Flow
Feb. 3, 2016
Safe Harbor 2.0 Agreement Reached
Nov. 25, 2015
FTC Loses Its First Data Security Case
Apr. 8, 2015
Ten Actions for Effective Data Risk Management
Nov. 30, 2022
Navigating Evolving Social Media Risks
Mar. 2, 2022
Blockchain Recordkeeping Stirs Privacy Concerns
Jan. 13, 2021
Checklist for IoT Security Audits
Dec. 9, 2020
What the New IoT Act Means for the Private Sector
Nov. 4, 2020
A Guided Tour of Enterprise IoT Device Hazards
Jul. 8, 2020
Privacy Compliant Return-to-Work Checklist
Apr. 8, 2020
Wide-Ranging Lessons From Notable Breaches in Q1
Jul. 31, 2019
Takeaways From the U.K. ICO’s FaceApp Warning
Feb. 20, 2019
Fixing the Chinks in Companies’ Cyber Armor: Executives
Oct. 17, 2018
Risks and Rewards of Bluetooth Technology
Jan. 11, 2017
FTC Priorities for 2017 and Beyond
Nov. 30, 2016
New NIST and DHS IoT Guidance Signal Regulatory Growth
Sep. 21, 2016
Staying Cybersecure Without Mobile Device Management
Most-Read Articles
-
May 10, 2023
Aggressive Washington Health Privacy Law: Ten Compliance Priorities -
May 31, 2023
How CPOs Communicate Privacy’s Value to the Board -
May 24, 2023
Five Articles to Help Govern AI -
May 17, 2023
Practical Steps to Take Based on SEC’s Proposed Cybersecurity Risk Management Rule for Investment Advisers -
Mar. 22, 2023
Managing Legal Issues Arising From Use of ChatGPT and Generative AI: Industry Considerations and Practical Compliance Measures
Spotlight on Trailblazing Women
In honor of International Women’s Day, some of ION Analytics' editorial teams led by women interviewed notable women in the markets and industries we cover. In this part, Jill Abitbol and Rebecca Hughes Parker shined a spotlight on notable women in compliance and hedge fund, data privacy and cybersecurity, and anti-corruption law, including Amii Barnard-Bahn, Abigail Bell, Genna Garver, Jane Horvath, Barbara Li, Amy Mushahwar, Mara Senn and Carol Widger. The interviews are here.
Webinar on Compliant International Data Transfers


Listen here to our discussion with our colleagues at Ethos Privacy, which took place on March 1, 2022, on how to approach international data transfer challenges.