Data Privacy
- Litigation
- Compliance
- Connected Devices
Mar. 22, 2023
ECJ Ruling Expands Legal Professional Privilege
Sep. 14, 2022
Shaping the BIPA Landscape: Avoiding Liability
Mar. 16, 2022
No End in Sight: Biometrics Litigation Trends
Jan. 19, 2022
Privacy Resolutions for 2022
Oct. 20, 2021
Collective Actions in the U.K. After Lloyd v. Google
Jun. 9, 2021
To “Cure” or Not to “Cure,” That Is the Question
Feb. 17, 2021
Big Questions for BIPA Case Law in 2021
Jun. 8, 2016
Minimizing Class Action Risk in Breach Response
Sep. 16, 2015
Privacy and Cybersecurity in Canada: Legal Risk Update
Aug. 16, 2023
Why Companies Unintentionally Fail to Honor Opt-Outs
Jul. 12, 2023
SEC Remains Focused on Off-Channel Communications
Jun. 14, 2023
Messaging Apps Come Under Increasing Regulatory Scrutiny
May 31, 2023
Colorado Controllers: The Final (Rules’) Frontier
May 31, 2023
How CPOs Communicate Privacy’s Value to the Board
Mar. 15, 2023
A Roadmap to the Final Regulations Under the CPRA
Mar. 1, 2023
Getting Used to Zero Trust? Meet Zero Copy
Feb. 1, 2023
Key Privacy Issues for 2023
Nov. 30, 2022
Understanding and Implementing Privacy Audits
Nov. 30, 2022
Navigating Evolving Social Media Risks
Nov. 16, 2022
Compliance Checklist for Consumer and Employee DSARs
Nov. 9, 2022
Lessons From the Conviction of Uber’s Former CISO
Oct. 19, 2022
GM CCO Talks Data, Culture, ESG and Scope Creep
Sep. 28, 2022
Lessons From California’s First CCPA Enforcement Action
Sep. 14, 2022
Shaping the BIPA Landscape: Avoiding Liability
Jun. 1, 2022
FINRA Clarifies Stance on CCO Supervisory Liability
May 4, 2022
Effective Use of Privacy Impact Assessments
Mar. 23, 2022
Are “Privacy-First” Clean Rooms Safe From Regulators?
Mar. 2, 2022
Blockchain Recordkeeping Stirs Privacy Concerns
Feb. 16, 2022
The Privacy and Antitrust Paradox in the Age of Data
Jan. 19, 2022
Privacy Resolutions for 2022
Dec. 15, 2021
Understanding Differential Privacy
Dec. 15, 2021
A Guide to Privacy Frameworks: Finding the Best Fit
Dec. 8, 2021
A Guide to Privacy Frameworks: Examining Options
Nov. 17, 2021
Data Localization: Cybersecurity Challenges Abound
Nov. 3, 2021
Data Localization: Laws Spread and Enforcement Rises
Oct. 20, 2021
Collective Actions in the U.K. After Lloyd v. Google
Sep. 22, 2021
Jacki Cheslow on IEEE’s Remote Program Assessment
Jun. 23, 2021
Three Years In, GDPR Legal Landscape Remains in Flux
Jun. 16, 2021
Leveraging Policies and Culture: A Recipe for Success
Jun. 9, 2021
To “Cure” or Not to “Cure,” That Is the Question
Feb. 10, 2021
GDPR Lives On in the U.K. Post-Brexit
Jan. 20, 2021
Privacy Resolutions for 2021
Jan. 20, 2021
Disputed Twitter Fine Offers Breach Response Lessons
Jan. 13, 2021
Checklist for IoT Security Audits
Dec. 16, 2020
AI for Compliance: Building a Model
Nov. 11, 2020
AI for Compliance: Foundations
Nov. 4, 2020
A Guided Tour of Enterprise IoT Device Hazards
Sep. 9, 2020
Implementing the CCPA Regulations: Are You Ready?
Aug. 12, 2020
Navigating China’s Cybersecurity Regulatory Maze
Jun. 10, 2020
How Compliance Departments Are Responding to COVID‑19
Apr. 8, 2020
Wide-Ranging Lessons From Notable Breaches in Q1
Mar. 25, 2020
Gauging the GDPR’s Global Reach
Mar. 11, 2020
Privacy and Cyber Due Diligence in M&A Transactions
Feb. 12, 2020
How to Approach CCPA’s Under-16 Opt‑in Consent
Feb. 12, 2020
Compliance Records Are a Strategic Gold Mine
Jan. 29, 2020
30 Creative Ideas for Compliance Messaging
Dec. 11, 2019
How to Handle E.U. Data Subject Access Requests
Dec. 11, 2019
Not Just GDPR: Examining the Other European Privacy Laws
Oct. 2, 2019
Preserving Customer Goodwill After a Breach
Aug. 21, 2019
Examining Portugal’s GDPR Implementation Statute
Jul. 31, 2019
Learning From the Equifax Settlement
Jul. 17, 2019
Maine Enacts Sweeping Broadband Customer Privacy Law
Jul. 10, 2019
Can GDPR Hinder AI Made in Europe?
Jun. 19, 2019
Kids, Privacy & Legal Compliance
Feb. 6, 2019
Analyzing Early GDPR Enforcement: France
Jan. 30, 2019
Analyzing Early GDPR Enforcement: U.K. and Austria
Jan. 23, 2019
Analyzing Early GDPR Enforcement: Portugal and Germany
Dec. 19, 2018
Interim Response Lessons From the Marriott Breach
Nov. 7, 2018
How GoDaddy Built an Effective Privacy Program
Oct. 17, 2018
Regulating AI: U.S., E.U. and Industry Laws and Guidance
Aug. 1, 2018
Staying Current With Geolocation Restrictions
Mar. 28, 2018
Evaluating Cybersecurity Coverage in Light of the GDPR
Mar. 14, 2018
How Will the GDPR Affect Due Diligence?
Feb. 28, 2018
The GDPR’s Data Subject Rights and Why They Matter
Feb. 14, 2018
Using Technology to Comply With the GDPR
Nov. 8, 2017
Managing Data Privacy Across Multiple Jurisdictions
Oct. 25, 2017
Privacy Shield Survives First Annual Review
May 17, 2017
Tracking Data and Maximizing Its Potential
Jan. 11, 2017
FTC Priorities for 2017 and Beyond
Jan. 11, 2017
Ten Cybersecurity Priorities for 2017
Sep. 21, 2016
Staying Cybersecure Without Mobile Device Management
Jul. 20, 2016
Key Requirements of the Newly Approved Privacy Shield
Jul. 20, 2016
Challenges Facing Chief Privacy Officers
Jul. 20, 2016
Using Data Analytics to Combat Internal Cyber Threats
May 11, 2016
Privacy Concerns in a Cashless Society
Feb. 17, 2016
Deal Struck to Maintain the Transatlantic Data Flow
Feb. 3, 2016
Safe Harbor 2.0 Agreement Reached
Nov. 25, 2015
FTC Loses Its First Data Security Case
Apr. 8, 2015
Ten Actions for Effective Data Risk Management
Jul. 12, 2023
SEC Remains Focused on Off-Channel Communications
Jun. 14, 2023
Messaging Apps Come Under Increasing Regulatory Scrutiny
Nov. 30, 2022
Navigating Evolving Social Media Risks
Mar. 2, 2022
Blockchain Recordkeeping Stirs Privacy Concerns
Jan. 13, 2021
Checklist for IoT Security Audits
Dec. 9, 2020
What the New IoT Act Means for the Private Sector
Nov. 4, 2020
A Guided Tour of Enterprise IoT Device Hazards
Jul. 8, 2020
Privacy Compliant Return-to-Work Checklist
Apr. 8, 2020
Wide-Ranging Lessons From Notable Breaches in Q1
Jul. 31, 2019
Takeaways From the U.K. ICO’s FaceApp Warning
Feb. 20, 2019
Fixing the Chinks in Companies’ Cyber Armor: Executives
Oct. 17, 2018
Risks and Rewards of Bluetooth Technology
Jan. 11, 2017
FTC Priorities for 2017 and Beyond
Nov. 30, 2016
New NIST and DHS IoT Guidance Signal Regulatory Growth
Sep. 21, 2016
Staying Cybersecure Without Mobile Device Management
Most-Read Articles
-
Sep. 13, 2023
NYC AI Audit Law: What Five Companies Published – and How Others Avoid It -
Aug. 30, 2023
Cyber and Privacy Program Checklists -
Aug. 16, 2023
Checklist for Framing and Assessing Third-Party Risk -
Jan. 5, 2022
Compliance Checklist for AI and Machine Learning -
Sep. 6, 2023
An Analysis of the Liberal and Strict Provisions in India’s New Privacy Law
Spotlight on Trailblazing Women
In honor of International Women’s Day, some of ION Analytics' editorial teams led by women interviewed notable women in the markets and industries we cover. In this part, the Cybersecurity Law Report highlighted notable women in compliance and hedge fund, data privacy and cybersecurity, and anti-corruption law, including Amii Barnard-Bahn, Abigail Bell, Genna Garver, Jane Horvath, Barbara Li, Amy Mushahwar, Mara Senn and Carol Widger. The interviews are here.