• Search for " " on Law Report Group

    HOME

    TOPICS

    ABOUT US

  • |
  • Home
  • Topics A-Z
  • Regulations & Enforcement
  • Data Security
  • Data Privacy
  • In-House Essentials
  • Checklists
  • Events
  • About Us
  • Subscribe

Data Privacy

  • Litigation
  • Compliance
  • Connected Devices

Jan. 11, 2023

Something’s Gotta Give: Navigating Auditor Inquiries in Investigations (Part Two of Two)

Jan. 4, 2023

Something’s Gotta Give: Navigating Auditor Inquiries in Investigations (Part One of Two)

Dec. 7, 2022

Checklist for Preserving Privilege of Forensic Analyses Post Breach

Oct. 26, 2022

Navigating the Interplay of Breach Response and Breach Notification

Sep. 14, 2022

Shaping the BIPA Landscape: Avoiding Liability

Sep. 07, 2022

Shaping the BIPA Landscape: Notable Trends and Developments

Aug. 10, 2022

Tips for How In-House Counsel Can Navigate Typical Ethical Dilemmas and Conflicts of Interest (Part Two of Two)

Aug. 3, 2022

Importance of In-House Counsel Discerning Their Client and Managing Evolving Attorney-Client Privilege Issues (Part One of Two)

Jul. 20, 2022

Looking Back on the Breach: Fundamentals of Preserving Privilege of Forensic Analyses in the Wake of a Data Breach

Jun. 29, 2022

Lessons From CISA for In-House Counsel on Mitigating and Managing MSP Breach Threats

Mar. 16, 2022

No End in Sight: Biometrics Litigation Trends

Feb. 2, 2022

Compliance Takeaways From the Latest GDPR Enforcement Statistics

Jan. 19, 2022

Privacy Resolutions for 2022

Oct. 20, 2021

Collective Actions in the U.K. After Lloyd v. Google

Sep. 22, 2021

Examining the Intersection of Voiceprints and Data Privacy Laws

Jul. 28, 2021

Will Supreme Court’s New Standing Test Tame the Real World of Class Actions?

Jun. 9, 2021

To “Cure” or Not to “Cure,” That Is the Question

Mar. 3, 2021

Six Ways to Address Privacy Concerns in Biometric Vendor Contracts

Mar. 3, 2021

Preserving the Privilege for In-House Counsel: Internal Investigations and Depositions

Feb. 24, 2021

Conduct Remedies: The Undervalued Element of Cybersecurity and Privacy Class Actions

Feb. 24, 2021

Preserving the Privilege for In-House Counsel: Communications and Common Issues

Feb. 17, 2021

Big Questions for BIPA Case Law in 2021

Feb. 3, 2021

Expect Continuing Regulatory Focus on Cybersecurity and Data Protection in 2021

Jan. 27, 2021

Steps to Protect Privilege for Data Breach Forensic Reports

Dec. 2, 2020

Facebook Wiretap Ruling Inspires Slew of Lawsuits Over Consumer Tracking

Nov. 4, 2020

Comparing U.S. and E.U. Approaches to Incident Response and Breach Notification

Oct. 14, 2020

Top Priorities for Compliance With Brazil’s New Personal Data Protection Law

Sep. 23, 2020

Data Breaches, Leaked Documents and the Attorney-Client Privilege: Can the Bell Really Be Unrung?

Jul. 15, 2020

Google Decision Opens the Door for American-Style Class Action in U.K.: Six Ways to Avoid Liability

Jul. 8, 2020

Google Decision Opens the Door for American-Style Class Action in U.K.: Analyzing What Constitutes Harm

Jun. 10, 2020

After Capital One Ruling, How Will Companies Protect Forensic Reports?

Jun. 3, 2020

Preserving Privilege in Audits and Internal Investigations

May 6, 2020

Managing Ransomware’s Mutation Into a Public Data Breach

Apr. 29, 2020

What Is the Potential Liability for Zoombombing, and How Safe Are Zoom Alternatives?

Oct. 30, 2019

Broad but Limited Reach of GDPR Highlighted in ECJ Google Ruling on “Right to Be Forgotten”

Sep. 18, 2019

Strategies and Tactics for Developing an Effective Tabletop Exercise (Part One of Two)

Aug. 7, 2019

Lessons From SDNY Ruling on How to Preserve Privileged Communications With Attorney Consultants

Apr. 3, 2019

Combatting Privacy Issues Arising From Geolocation Data Use: Understanding the Legal Landscape

Mar. 27, 2019

Navigating the Risks of Alternative Data Collection and Use

Mar. 20, 2019

Increased Post-Breach Discovery Turns Spotlight on Privilege

Feb. 27, 2019

Preserving Privilege in Communications Involving In-House Counsel

Feb. 13, 2019

Reducing Risk in the Dawn of Equifax and Other Cyber-Related Securities Fraud Class Actions

Jan. 23, 2019

Illinois Federal Court Denies Standing in BIPA Claim Against Google

Dec. 12, 2018

Illinois Appellate Decision Creates Split on Standing to Sue Under BIPA

Dec. 5, 2018

Answers to Four Critical Questions on Privilege in Internal Investigations

Sep. 19, 2018

Ohio Adopts Pioneering Cybersecurity Safe Harbor for Companies

May 9, 2018

The Right to Be Forgotten: English High Court Details When Google Must Delist Links to Crimes

May 2, 2018

Lessons on Litigation Privilege in Internal Investigations from the U.K.’s Bilta v. Royal Bank of Scotland Case

Feb. 14, 2018

Dynamic Regulations and Shareholder Actions Guide the Board’s Shifting Role in Cyber (Part Two of Two)

Feb. 14, 2018

NY AG and HHS Flex Regulatory Muscles in Recent Protected Health Information Breach Settlements

Jan. 31, 2018

Biometric Data Protection Laws and Litigation Strategies (Part One of Two)

Jan. 31, 2018

Dynamic Regulations and Shareholder Actions Guide the Board’s Shifting Role in Cyber (Part One of Two)

Dec. 6, 2017

Actions Under Biometric Privacy Laws Highlight Related Risks

Oct. 11, 2017

Reconciling Data Localization Laws and the Global Flow of Information

Sep. 27, 2017

New Criteria for Employee Monitoring Practices in Light of ECHR Decision

Sep. 13, 2017

Dispelling Myths About When Attorney-Client Privilege Applies to Communications With In-House Counsel

May 31, 2017

Reacting Quickly With a Nimble Incident Response Plan

Apr. 19, 2017

How to Walk the Tightrope of Cooperation and Privilege When Facing Government Investigations and Parallel Litigation

Mar. 8, 2017

Defense and Plaintiff Perspectives on How to Survive Data Privacy Collateral Litigation

Mar. 8, 2017

Protecting Attorney-Client Privilege and Attorney Work Product While Cooperating With the Government: Implications for Collateral Litigation (Part Three of Three)

Feb. 22, 2017

Protecting Attorney-Client Privilege and Attorney Work Product While Cooperating with the Government: Strategies to Minimize Risks During Cooperation (Part Two of Three)

Feb. 8, 2017

Protecting Attorney-Client Privilege and Attorney Work Product While Cooperating With the Government: Establishing Privilege and Work Product in an Investigation (Part One of Three)

Feb. 8, 2017

Third and Seventh Circuits Shed New Light on Spokeo Standing Analysis

Nov. 30, 2016

Attorney-Consultant Privilege? Structuring and Implementing the Kovel Arrangement (Part Two of Two)

Nov. 16, 2016

Attorney-Consultant Privilege? Key Considerations for Invoking the Kovel Doctrine (Part One of Two)

Sep. 7, 2016

Lessons From Consumer Challenges to Email Review Practices

Aug. 3, 2016

Six State Secrets and Data Privacy Considerations in Chinese Internal Investigations 

Jun. 22, 2016

How to Avoid Common Mistakes and Manage the First 48 Hours Post-Breach

Jun. 8, 2016

Minimizing Class Action Risk in Breach Response

Jun. 8, 2016

Eight Attributes In-House Counsel Look For in Outside Cybersecurity Counsel

May 25, 2016

Foreign Attorneys Share Insight on Data Privacy and Privilege in Multinational Investigations

May 25, 2016

Spokeo’s Impact on Data Breach Cases: The Class Action Floodgates Have Not Been Opened, But the Door Has Not Been Locked

May 11, 2016

When Do Consumers Have Standing to Sue Over Data Breaches?

Apr. 27, 2016

Federal Judge Offers Advice on Litigating Data Privacy, Security Breach and TCPA Class Action Suits

Apr. 27, 2016

A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: From Data Mapping to Evaluation (Part One of Three)

Mar. 30, 2016

In-House and Outside Counsel Offer Strategies for Navigating the TCPA, Avoiding Litigation and Responding to Breaches

Mar. 30, 2016

Making Sense of Conflicting Standing Decisions in Data Breach Cases

Feb. 3, 2016

Germany Eases Restrictions on Certain Privacy Class Actions

Dec. 9, 2015

Proactive Steps to Protect Your Company in Anticipation of Future Data Security Litigation (Part Two of Two)

Nov. 25, 2015

Proactive Steps to Protect Your Company in Anticipation of Future Data Security Litigation (Part One of Two)

Nov. 11, 2015

Target Privilege Decision Delivers Guidance for Post-Data Breach Internal Investigations

Nov. 11, 2015

California Law Enforcement Faces Higher Bar in Acquiring Electronic Information

Sep. 16, 2015

Privacy and Cybersecurity in Canada: Legal Risk Update

Sep. 16, 2015

Examining Evolving Legal Ethics in the Age of the Cloud, Mobile Devices and Social Media (Part Two of Two)  

Jul. 29, 2015

Seventh Circuit Reopens a Door for Plaintiffs in Data Breach Class Actions

Jul. 29, 2015

Analyzing and Complying with Cyber Law from Different Vantage Points (Part Two of Two)

Jul. 15, 2015

Analyzing and Complying with Cyber Law from Different Vantage Points (Part One of Two)

Jul. 1, 2015

What Companies Need to Know About the FCC’s Actions Against Unwanted Calls and Texts

Jul. 1, 2015

Preserving Privilege Before and After a Cybersecurity Incident (Part Two of Two)

Jun. 17, 2015

Preserving Privilege Before and After a Cybersecurity Incident (Part One of Two)

May 6, 2015

Lessons from the 2013 Target Data Breach: What Future Resolutions of Large-Scale Data Breaches May Look Like

Feb. 1, 2023

Key Privacy Issues for 2023

Jan. 25, 2023

France’s Cookie Enforcement Against TikTok and Microsoft Highlights Common Compliance Missteps

Jan. 25, 2023

E.U. Regulators Bar Meta From Requiring Users to Pay With Their Data

Jan. 18, 2023

Scrutiny Over Dark Patterns Presents Further Challenges in Online Contracting

Jan. 18, 2023

Electronic Communications, Cooperation Standards and Other Emerging Trends in the SEC’s Oversight of Private Funds

Jan. 18, 2023

A Sensitive Time for Location Data: Tips to Address New Rules and Vendor Standards

Jan. 4, 2023

FTC and $391-Million State AG Case Put Location Data Enforcement on the Map

Dec. 14, 2022

Recent FTC Cases Highlight Evolving Regulatory Expectations in the Use of Multi-Factor Authentication

Dec. 14, 2022

The Importance of Being a PIPL Pleaser: Update and Predictions on China’s Data Protection Law One Year In

Dec. 7, 2022

Google Settlement Shows DOJ's Increased Focus on Data Preservation

Dec. 7, 2022

How Lawyers Can Leverage the Shifting Environment to Enhance Compliance Programs

Nov. 30, 2022

Understanding and Implementing Privacy Audits

Nov. 30, 2022

FTC’s Drizly Case Shows Regulators Are Ready to Police Data’s Expiration Dates

Nov. 30, 2022

Navigating Evolving Social Media Risks

Nov. 16, 2022

Compliance Checklist for Consumer and Employee DSARs

Nov. 16, 2022

What the FAQ: Deciphering the European Commission Guidance on the New SCCs

Nov. 9, 2022

Lessons From the Conviction of Uber’s Former CISO

Nov. 2, 2022

Revised Monaco Memo Affects Compensation, Clawbacks and Monitorships

Nov. 2, 2022

How the New E.U.-U.S. Data Privacy Framework Clears a Path for Transatlantic Business

Oct. 26, 2022

Navigating the Interplay of Breach Response and Breach Notification

Oct. 19, 2022

GM CCO Talks Data, Culture, ESG and Scope Creep

Oct. 12, 2022

Metaverse IRL: Are Companies Overlooking the Privacy Risks of NFTs and Crypto Wallets?

Oct. 12, 2022

How the Revised Monaco Memo Alters Deal Making and Strategy

Oct. 5, 2022

Metaverse IRL: Grappling With Biometric Data and Privacy Notices in VR Headsets

Oct. 5, 2022

A PR Blitz as DOJ Fine-Tunes Its Corporate Enforcement Policies

Sep. 28, 2022

Lessons From California’s First CCPA Enforcement Action

Sep. 21, 2022

Metaverse IRL: Tackling Privacy Amid the Rampant Hype and Burst of Deals

Sep. 21, 2022

Trio of Settled Enforcement Actions Highlights SEC Concerns About Identity Theft Policies and Procedures

Sep. 14, 2022

Robinhood Resolution a First for Cryptocurrency Enforcement in NY

Sep. 14, 2022

Compliance Survey Finds Data Management Challenges, Rising Costs and Increasing Uptake of RegTech

Sep. 14, 2022

Shaping the BIPA Landscape: Avoiding Liability

Aug. 17, 2022

SEC Cyber Rules: How to Prepare for the New 10-K Disclosure Mandates

Jul. 27, 2022

Designing a Privacy Center to Build Trust and Facilitate Business Growth

Jul. 27, 2022

Employee Data Under the CPRA: Rights Requests, Privacy Policies and Enforcement

Jul. 20, 2022

Corporate Compliance and Enforcement Hot Topics With IBM VP Una Dean

Jul. 20, 2022

Employee Data Under the CPRA: Key Rights and Restrictions

Jul. 13, 2022

CPRA Draft Regulations: Essential Takeaways and 10 Actions to Take Now

Jun. 22, 2022

Learning From Twitter’s $150-Million Privacy Disclosure Mistakes

Jun. 8, 2022

Regulation Looms for Sharing of Sensitive Financial Data

Jun. 1, 2022

FINRA Clarifies Stance on CCO Supervisory Liability

Jun. 1, 2022

Roadmap for Building an Efficient Global Privacy Program: Maintenance

May 25, 2022

TV Privacy: Will the TV Industry Agree to Standardize Consent on Screen?

May 18, 2022

Roadmap for Building an Efficient Global Privacy Program: Buy-In, Scalability and Outside Resources

May 18, 2022

Navigating the Intersection of Blockchain and Data Privacy Laws

May 18, 2022

TV Privacy: Can Old Remotes Handle New Consent Requirements?

May 11, 2022

Roadmap for Building an Efficient Global Privacy Program: Scope and Prioritization

May 11, 2022

Party of Five: Connecticut Law Solidifies Consensus on State Privacy Standards

May 4, 2022

Roadmap for Building an Efficient Global Privacy Program: Organizational Structure

May 4, 2022

Effective Use of Privacy Impact Assessments

Apr. 27, 2022

Preparing for CPRA Compliance: Jurisdictional Focus or a More Holistic Approach?

Apr. 27, 2022

New Utah Privacy Law Marks a Shift in State Privacy Legislation

Apr. 20, 2022

FTC’s Khan and Phillips Deliver Views on Future of Data Privacy Enforcement

Apr. 20, 2022

Privacy Enforcers Across the Globe Band Together to Coordinate Investigations

Apr. 13, 2022

California AG Opinion Hands Companies New Tasks for AI, Data Maps, Marketing

Apr. 13, 2022

U.S., E.U. Announce Trans-Atlantic Data Privacy Framework: What Companies Can Do Now

Mar. 30, 2022

The Parallels and Distinctions Between Investigations and Culture Reviews

Mar. 30, 2022

Drafting Data and Cybersecurity Provisions in Third-Party Vendor Agreements

Mar. 23, 2022

Are “Privacy-First” Clean Rooms Safe From Regulators?

Mar. 23, 2022

Identifying and Tackling Privacy and Cyber Due Diligence Challenges in M&A

Mar. 16, 2022

How Combining Approaches to Data Analytics Can Yield Powerful Insights

Mar. 9, 2022

A Look at the NSCP’s Firm and CCO Liability Framework

Mar. 2, 2022

Blockchain Recordkeeping Stirs Privacy Concerns

Mar. 2, 2022

Navigating Post-Schrems II International Data Transfer Waters: SCCs and Supplementary Measures

Feb. 23, 2022

Navigating Post-Schrems II International Data Transfer Waters: Challenges and TIAs

Feb. 23, 2022

Ad Industry’s Third-Party Data Use Grew Despite Impending Cookie Shutdown

Feb. 16, 2022

The Privacy and Antitrust Paradox in the Age of Data

Feb. 9, 2022

Leveraging Partnerships to Operationalize Privacy Programs

Feb. 9, 2022

Will It Be Goodbye Forever? Navigating Consumer Requests to Delete Personal Data

Feb. 2, 2022

Compliance Takeaways From the Latest GDPR Enforcement Statistics

Jan. 26, 2022

Personal Liability and Compliance Resourcing Are Top Concerns Among CCOs, Surveys Show

Jan. 19, 2022

Privacy and Security Due Diligence in M&A Transactions: Going Beyond the Questionnaire

Jan. 19, 2022

Two European Regulators Warn Behavioral Advertising Skates on Thin Ice

Jan. 19, 2022

Privacy Resolutions for 2022

Jan. 5, 2022

A Guide to Privacy Frameworks: Implementation and Maintenance

Dec. 15, 2021

Understanding Differential Privacy

Dec. 15, 2021

A Guide to Privacy Frameworks: Finding the Best Fit

Dec. 8, 2021

Privacy Tech Products Hold Promise but Sector Faces Hurdles

Dec. 8, 2021

A Guide to Privacy Frameworks: Examining Options

Dec. 01, 2021

FTC Sets Wheels in Motion for a Broad Privacy Rule Restricting Data Collection

Dec. 01, 2021

Using Technology and Outsourcing to Enhance Compliance Programs and Manage Conflicts of Interest

Nov. 17, 2021

Data Localization: Cybersecurity Challenges Abound

Nov. 17, 2021

Practical Approaches to Conducting Transfer Impact Assessments Under the GDPR

Nov. 10, 2021

Data Localization: New Compliance Headaches and Costs Across the Globe

Nov. 3, 2021

Data Localization: Laws Spread and Enforcement Rises

Nov. 3, 2021

In-House Insight on Handling Data Subject Access Requests Under Multiple Privacy Regimes

Oct. 27, 2021

Lessons From the WhatsApp Decision on GDPR Transparency Requirements: Compliance Foundations

Oct. 20, 2021

U.K. Data Privacy Officers Discuss Challenges and Concerns

Oct. 20, 2021

Collective Actions in the U.K. After Lloyd v. Google

Oct. 20, 2021

Lessons From the WhatsApp Decision on GDPR Transparency Requirements: Enforcement Takeaways

Oct. 13, 2021

China’s First Information Protection Law: Compliance Essentials

Sep. 22, 2021

Examining the Intersection of Voiceprints and Data Privacy Laws

Sep. 22, 2021

Jacki Cheslow on IEEE’s Remote Program Assessment

Sep. 15, 2021

Leadership Insights From CPOs at Google, J.P. Morgan and Dow Jones

Sep. 15, 2021

Electronic Communications: Using Third Parties for Compliance, Mitigating Social Media Risks and Fulfilling Document Requests

Sep. 8, 2021

What to Expect From the FCC and FTC Under the Biden Administration

Sep. 8, 2021

Imperva’s Global Data Privacy Officer Discusses Privacy by Design

Sep. 8, 2021

Electronic Communications: Useful Training Techniques and Policies and Procedures to Adopt

Aug. 18, 2021

Electronic Communications: Current Technological Landscape and Relevant Regulatory Measures

Aug. 4, 2021

Evaluating Privacy and Cybersecurity Risks in Emerging Technology Transactions: Artificial Intelligence and EdTech

Jul. 21, 2021

Shedding Light on Dark Patterns: What Financial Institutions Need to Know

Jul. 21, 2021

Vaccines and Testing in the Post-Pandemic Workplace: Answers to the Tough Questions

Jul. 14, 2021

Personal Data Transfers After Year Zero: A More Appealing Set of EDPB Recommendations?

Jul. 14, 2021

Vaccines and Testing in the Post-Pandemic Workplace: Understanding the Legal Framework and Making a Balanced Plan

Jun. 30, 2021

Personal Data Transfers After Year Zero: Are the New SCCs a Paradigm Shift?

Jun. 30, 2021

DOL Begins Cyber Audits to Protect U.S. Workers’ Retirement Savings

Jun. 23, 2021

Colorado Privacy Law Finishes Third, but Could Become the New Standard

Jun. 23, 2021

Three Years In, GDPR Legal Landscape Remains in Flux

Jun. 16, 2021

The Impact of Recent Legislative and Litigation Trends on Commercial Use of De-Identified Data

Jun. 16, 2021

Leveraging Policies and Culture: A Recipe for Success

Jun. 9, 2021

To “Cure” or Not to “Cure,” That Is the Question

Jun. 2, 2021

U.K. Data Protection Regulator Smooths Way for Fund Managers to Transfer Data to SEC

Jun. 2, 2021

Post-COVID Compliance Strategies: Dealing With Persistent Heightened Risks

May 5, 2021

Balancing Legalese and Simplicity in Modern Privacy Policies

Apr. 28, 2021

First 100 Days As GC/CCO: Managing Daily Work, Performing Risk Assessments and Looking Ahead

Apr. 21, 2021

First 100 Days As GC/CCO: Developing Knowledge and Forging Key Relationships

Apr. 21, 2021

Supreme Court’s Facebook Decision Narrows Applicability of the TCPA, but Companies Are Not Home Free

Apr. 14, 2021

First 100 Days As GC/CCO: Preparing for the Role and Setting the Tone

Apr. 7, 2021

Former Twitter and eBay Counsel Talks Overblown Fears, Third-Party Data Management, and CDA Section 230

Apr. 7, 2021

Behind the Scenes: California AG’s Non-Public CCPA Inquiries

Apr. 7, 2021

Did Clubhouse Sacrifice Privacy for Innovation? How to Find the Balance 

Mar. 31, 2021

KBR v. SFO: Implications for Overseas Document Production

Mar. 31, 2021

How Do You Put a System of Controls in Place When Your Target Keeps Moving?

Mar. 31, 2021

Managing Vendor Contracts From the Data Controller's Perspective

Mar. 24, 2021

Privacy and Security Provisions in Vendor Agreements: Key Data Processing Considerations

Mar. 24, 2021

Recommended Data Strategies As Google Swears Off Web Tracking

Mar. 17, 2021

Privacy and Security Provisions in Vendor Agreements: Assessing the Risks

Mar. 10, 2021

AI for Compliance: Five Workarounds for Asymmetric Data Sets

Mar. 10, 2021

Preparing for the CPRA’s New Consumer Rights Requirements

Mar. 10, 2021

Familiar and Fresh Mandates in Virginia’s New Privacy Law

Mar. 3, 2021

Best Practices for Data Transfers in the Wake of Schrems II

Feb. 24, 2021

Cargill Compliance Director Discusses Putting Training Data to Work

Feb. 10, 2021

GDPR Lives On in the U.K. Post-Brexit

Feb. 3, 2021

Expect Continuing Regulatory Focus on Cybersecurity and Data Protection in 2021

Jan. 27, 2021

The Potential Legal Implications of Web Scraping for Market Research

Jan. 20, 2021

Privacy Resolutions for 2021

Jan. 20, 2021

Disputed Twitter Fine Offers Breach Response Lessons

Jan. 13, 2021

Checklist for IoT Security Audits

Jan. 6, 2021

Maintaining Privacy While Staying Competitive in an Evolving Regulatory Landscape

Jan. 6, 2021

Six Practical Tips for Building an Effective Privacy Risk Assessment Program

Jan. 6, 2021

Privacy and Security Risks in International Arbitration: Managing Remote Proceedings

Dec. 16, 2020

AI for Compliance: Building a Model

Dec. 16, 2020

Privacy and Security Risks in International Arbitration: Threats and the Information Security Protocol

Dec. 9, 2020

Strategies for Managing the Intersection of Cybersecurity and New Technologies

Dec. 2, 2020

Facebook Wiretap Ruling Inspires Slew of Lawsuits Over Consumer Tracking

Dec. 2, 2020

ICO Hones GDPR Enforcement Approach With Reduced Fines for British Airways, Marriott and Ticketmaster

Dec. 2, 2020

How CCOs Can Avoid Personal Liability for an Organization’s Compliance Failures

Nov. 18, 2020

Show Me the Data: How to Conduct Audits for Data Minimization

Nov. 18, 2020

SEC Commissioner Peirce Shares Views on Personal Liability for CCOs

Nov. 11, 2020

The Intelligent Workplace in the Age of a Pandemic: Six Privacy and Security Safeguards

Nov. 11, 2020

Understanding the World’s New Four-Letter Privacy Law: China’s PIPL

Nov. 11, 2020

AI for Compliance: Foundations

Nov. 4, 2020

Comparing U.S. and E.U. Approaches to Incident Response and Breach Notification

Nov. 4, 2020

A Guided Tour of Enterprise IoT Device Hazards

Oct. 28, 2020

The Intelligent Workplace in the Age of a Pandemic: Balancing Innovation and Risk

Oct. 21, 2020

How Lockheed Uses Big Data to Evaluate Risk at Small Worksites

Oct. 14, 2020

H&M’s $41M GDPR Fine Underscores Importance of Employee Data Handling

Oct. 14, 2020

Top Priorities for Compliance With Brazil’s New Personal Data Protection Law

Oct. 7, 2020

How to Address Intensifying Enterprise IoT Security Risks

Sep. 30, 2020

What to Expect From the CPRA – California’s New Proposed Privacy Law

Sep. 23, 2020

Apple Overhauls Privacy for iPhone Apps, but Will It Enforce Its Policies?

Sep. 16, 2020

Four Principles Underlying Microsoft’s Compliance Analytics Program

Sep. 9, 2020

Implementing the CCPA Regulations: Are You Ready?

Sep. 2, 2020

Business Continuity Plans, Budgets and More: Hot Compliance Topics for Investment Advisers

Sep. 2, 2020

After Death of the Cookie, New Advertising Strategies Raise Compliance Questions

Aug. 12, 2020

Not Just TikTok: How Companies Can Mitigate Risk of Employee Social Media Use

Aug. 12, 2020

Navigating China’s Cybersecurity Regulatory Maze

Aug. 5, 2020

Early EDPB Guidance in the Wake of Schrems II Signals Where E.U.-U.S. Data Transfers Are Headed

Aug. 5, 2020

CCPA and Online Ads: Contract and Compliance Consequences

Jul. 29, 2020

CCPA and Online Ads: Facebook Finally Acts, AG Starts Enforcement

Jul. 22, 2020

Ten Initial Steps for E.U. and U.S. Companies in Light of Schrems II Ruling

Jul. 15, 2020

Back to the Table: CCPA Regulations Spark New Wave of Service-Provider Negotiations

Jun. 24, 2020

Balancing Privacy Rights and Innovation in Digital Contact Tracing

Jun. 24, 2020

Perspectives From the Public and Private Sectors on Information Sharing During COVID-19

Jun. 24, 2020

How to Comply With Key CCPA Notice and Consumer Request Requirements

Jun. 17, 2020

Privacy Settings May Serve as One-Step CCPA Opt-Out From Sale

Jun. 17, 2020

The (Im)Possibilities of Scientific Research Under the GDPR

Jun. 10, 2020

How Compliance Departments Are Responding to COVID‑19

May 27, 2020

Insights on Building a Compliance Program at a New Company

May 20, 2020

FTC and ICO Commissioners Discuss the Problems With Pandemic Tech and Their Enforcement Approaches

May 20, 2020

Did Adtech Fix Its CCPA Problem? IAB’s GC Discusses New Contract for Data Sales

May 13, 2020

NIST Privacy Framework: Privacy Controls for an Era of Digital Transformation

May 6, 2020

NIST Privacy Framework: Insights on New Tool for Managing Privacy Risks

Apr. 29, 2020

What Is the Potential Liability for Zoombombing, and How Safe Are Zoom Alternatives?

Apr. 22, 2020

Morrisons Ruling Lets U.K. Employers Off the Hook for Rogue Employee Data Leaks

Apr. 22, 2020

GDPR Enforcement Lessons and New ICO Guidance on COVID‑19

Apr. 15, 2020

Report on CCO Liability Calls for More Regulatory Cooperation

Apr. 15, 2020

Takeaways From Former FTC Officials on 2019 Enforcement Actions: Data Security Guidance and Enforcement Predictions

Apr. 8, 2020

Wide-Ranging Lessons From Notable Breaches in Q1

Apr. 8, 2020

Takeaways From Former FTC Officials on the Commission’s 2019 Enforcement: General, Financial and Children’s Privacy

Apr. 1, 2020

A Considered Cooperation Approach Is Vital in ICO Data Protection Audits

Mar. 25, 2020

Companywide Work From Home: Six Cybersecurity Considerations

Mar. 25, 2020

Gauging the GDPR’s Global Reach

Mar. 11, 2020

Privacy and Cyber Due Diligence in M&A Transactions

Feb. 26, 2020

Tips From Ponemon/Experian Survey on Building an Incident Response Plan That Fosters Confidence

Feb. 19, 2020

Best Practices for Using Alternative Data: Mitigating Regulatory Risks

Feb. 19, 2020

Consciously Coupling: Tackling the Juxtaposition Between Adtech and Privacy

Feb. 12, 2020

Compliance Records Are a Strategic Gold Mine

Feb. 12, 2020

How to Approach CCPA’s Under-16 Opt-In Consent

Feb. 12, 2020

Best Practices for Using Alternative Data: Collection and Provider Management

Feb. 5, 2020

Defining, Implementing and Documenting “Reasonable Security”

Feb. 5, 2020

The Rise of Facial Recognition Technology: Mitigating Risk

Jan. 29, 2020

30 Creative Ideas for Compliance Messaging

Jan. 29, 2020

The Rise of Facial Recognition Technology: Mapping the Legal Framework

Jan. 29, 2020

Establishing a Foundation for Breach-Notification Compliance in a Sea of Privacy Laws

Jan. 22, 2020

The Rise of Facial Recognition Technology: Uses and Risks

Jan. 8, 2020

How eBay and PayPal Use Key Performance Indicators to Evaluate and Improve Privacy Programs

Dec. 18, 2019

FTC Spyware Takedown Highlights Employee Monitoring Privacy Shifts

Dec. 18, 2019

Not Just the GDPR: Privacy Laws in Belarus, Russia, Switzerland, Turkey and Ukraine

Dec. 11, 2019

Not Just GDPR: Examining the Other European Privacy Laws 

Dec. 11, 2019

How to Handle E.U. Data Subject Access Requests

Dec. 4, 2019

U.K. and U.S. Sign First E-Evidence Pact Under the CLOUD Act: A Look at the Privacy Protections

Nov. 20, 2019

U.K. and U.S. Sign First E-Evidence Pact Under the CLOUD Act: Fewer Hurdles, More Clarity and New Questions

Nov. 13, 2019

Updating Vendor Agreements to Comply With CCPA: Non-Third Parties and Key Steps

Nov. 6, 2019

Updating Vendor Agreements to Comply With CCPA: Service-Provider Exemption and Corporate Approaches

Oct. 30, 2019

Broad but Limited Reach of GDPR Highlighted in ECJ Google Ruling on “Right to Be Forgotten”

Oct. 23, 2019

ICO Enforcement Takeaways After Marriott and British Airways

Oct. 16, 2019

Portuguese DPA Holds Parts of Portuguese Data Protection Law Inconsistent With GDPR

Oct. 16, 2019

How Uber, eBay and Pitney Bowes Built Principles-Based Global Privacy Programs

Oct. 9, 2019

CCPA Close-Up: Examining the GLBA Carve-Out and How Financial Institutions Can Evaluate Applicability

Oct. 9, 2019

Does the GDPR Disadvantage Non-E.U. Companies? Addressing the Lead Supervisory Authority Dilemma (Part Two)

Oct. 2, 2019

Does the GDPR Disadvantage Non-E.U. Companies? The Benefits of a Lead Supervisory Authority (Part One of Two)

Oct. 2, 2019

CCPA Close-Up: Review of Amendments and How to Prepare for Compliance

Oct. 2, 2019

Preserving Customer Goodwill After a Breach

Sep. 18, 2019

Far-Reaching Google and YouTube Settlement Offers COPPA Compliance Lessons

Sep. 11, 2019

Lessons From Equifax on How to Mitigate Post-Breach Legal Liability

Aug. 21, 2019

Examining Portugal’s GDPR Implementation Statute

Aug. 21, 2019

Third-Party Data Breaches Highlight the Importance of Vetting Vendors in Compliance With GDPR and CCPA

Aug. 7, 2019

How Facebook’s $5-Billion FTC Settlement Is Shaping Compliance Expectations

Jul. 31, 2019

Learning From the Equifax Settlement

Jul. 31, 2019

The Growing Role of the Chief Data Officer: Compliance and Third Parties

Jul. 24, 2019

Equifax and Facebook Settlements Overshadow More Routine FTC Summer Settlements

Jul. 24, 2019

The Growing Role of the Chief Data Officer: Reporting Structures and Budget

Jul. 17, 2019

The Growing Role of the Chief Data Officer: Skill Sets, Priorities and Collaboration

Jul. 17, 2019

Maine Enacts Sweeping Broadband Customer Privacy Law

Jul. 10, 2019

Parental Liability in the E.U.: Mitigating Liability at Various Stages of Portfolio Company Ownership

Jul. 10, 2019

Can GDPR Hinder AI Made in Europe?

Jul. 3, 2019

Combatting Privacy Issues Arising From Geolocation Data Use

Jun. 26, 2019

Parental Liability in the E.U.: Rebuttable Presumption of Decisive Influence and Four Misconceptions About Avoiding Liability

Jun. 26, 2019

Employee Privacy and Off-Duty Conduct: Balancing Company Interests Against Employee Rights

Jun. 19, 2019

Parental Liability in the E.U.: “Undertakings” and Potential Scope of Risk for Parent Entities

Jun. 19, 2019

Kids, Privacy & Legal Compliance

Jun. 19, 2019

Tips From Lockheed and Groupon on Developing GC-CISO Partnerships to Improve Security and Incident Response

Jun. 5, 2019

Irish Data Protection Commissioner Helen Dixon on Breach Notification, the Role of the DPO and a U.S. Privacy Law

May 29, 2019

Irish DPC Helen Dixon on GDPR Enforcement Hurdles One Year In

May 22, 2019

Deputy Assistant Attorney General Seeks to Dispel CLOUD Act Misunderstandings One Year In

May 15, 2019

ECJ Confirms Direct Parental Liability for Civil Damages for Subsidiary Antitrust or GDPR Violations

May 8, 2019

Lessons From FTC 2018 Privacy and Data Security Update: Hearings, Reports and 2019 Predictions

May 8, 2019

Making the Case for Increased Privacy Budgets Using Data and Diplomacy

May 1, 2019

Fresenius and Pearson Compliance Directors Discuss Corporate Community-Building

May 1, 2019

Lessons From FTC 2018 Privacy and Data Security Update: Financial Privacy, COPPA and International Enforcement

Apr. 24, 2019

Jeopardy, Coasters and the Behavioral Clock: Compliance Leaders at Fresenius and Pearson Discuss Effective Long- and Short-Term Initiatives

Apr. 24, 2019

Lessons From FTC's 2018 Privacy and Data Security Update: Enforcement Takeaways

Apr. 17, 2019

GPEN Report Highlights Key Areas for Data Privacy Improvement

Apr. 10, 2019

Combatting Privacy Issues Arising From Geolocation Data Use: Five Risk-Mitigation Strategies

Apr. 3, 2019

Combatting Privacy Issues Arising From Geolocation Data Use: Understanding the Legal Landscape

Mar. 27, 2019

Companies May Need to Re-Examine Approach to Breach Response Preparedness According to Experian Survey

Mar. 27, 2019

Navigating the Risks of Alternative Data Collection and Use

Mar. 20, 2019

A Quick-Start Guide to Creating a Compliance Champion Program

Mar. 20, 2019

COPPA Compliance Lessons Following Musical.ly’s $5.7 Million FTC Settlement

Mar. 13, 2019

Takeaways From 2018 COPPA Developments and a Forward-Thinking Approach to Compliance

Feb. 27, 2019

U.K. Employers on the Hook for Rogue Employee Data Leaks Post-Morrison​​​​​

Feb. 27, 2019

Preparing for the CCPA: Securing Buy-In and Setting the Scope

Feb. 20, 2019

Implications of the Illinois Supreme Court’s BIPA Holding Against Six Flags

Feb. 20, 2019

ACA Aponix-NSCP Cyber Survey Finds Growing Numbers of Security Incidents, Cloud Use and Regulatory Burdens

Feb. 6, 2019

Analyzing Early GDPR Enforcement: France

Feb. 6, 2019

Examining the New Requirements and Broad Definition of Data Broker Under Vermont’s New Law

Jan. 30, 2019

Analyzing Early GDPR Enforcement: U.K. and Austria

Jan. 23, 2019

Analyzing Early GDPR Enforcement: Portugal and Germany

Jan. 23, 2019

Illinois Federal Court Denies Standing in BIPA Claim Against Google

Jan. 16, 2019

GDPR Provides Model for Privacy and Security Laws in Latin America and Asia (Part Two of Two)

Jan. 9, 2019

GDPR Provides Model for Privacy and Security Laws in Latin America and Asia (Part One of Two)

Dec. 19, 2018

Interim Response Lessons From the Marriott Breach

Dec. 12, 2018

Implications of a Dynamic Regulatory and Threat Environment on E.U. and U.S. Cyber Insurance Markets

Dec. 12, 2018

Illinois Appellate Decision Creates Split on Standing to Sue Under BIPA

Dec. 5, 2018

Insights From Uber: Building Bridges Between Legal and Engineering

Nov. 28, 2018

Insights From Uber: An Inside Look at Its Privacy Team Structure and How Legal and Tech Collaborated on Its Differential Privacy Tool

Nov. 14, 2018

How Privacy Professionals Can Benefit Cybersecurity Programs: Practical Tips From Gap and Privacy Panacea

Nov. 7, 2018

How GoDaddy Built an Effective Privacy Program

Oct. 31, 2018

How to Comply With Canada’s New Privacy Breach Reporting and Record-Keeping Rules

Oct. 24, 2018

California Enacts Groundbreaking IoT Law and Requires Disclosure of Bot Use

Oct. 17, 2018

Regulating AI: U.S., E.U. and Industry Laws and Guidance

Sep. 19, 2018

Evolving Roles of Privacy and Security Professionals: Operationalizing Policies, Incident Response and Vendor Management

Sep. 12, 2018

Evolving Roles of Privacy and Security Professionals: Effective Governance and Board Reporting

Sep. 5, 2018

How the GDPR Will Affect Private Funds’ Use of Alternative Data

Sep. 5, 2018

Evolving Roles of Privacy and Security Professionals: Examining Required Skills and Potential Convergence

Sep. 5, 2018

Twenty Steps Toward Achieving an Effective Social Media Policy

Aug. 22, 2018

A Fund Manager’s Roadmap to Big Data: Privacy Concerns, Third Parties and Drones

Aug. 8, 2018

U.K.’s Cyber Essentials Provide a Window Into GDPR Security Infrastructure Requirements

Aug. 8, 2018

Essential Cyber, Tech and Privacy M&A Due Diligence Considerations

Aug. 8, 2018

A Fund Manager’s Roadmap to Big Data: Its Acquisition and Proper Use

Aug. 1, 2018

Staying Current With Geolocation Restrictions

Jul. 25, 2018

Implications of the Supreme Court’s Carpenter Decision on the Treatment of Cellphone Location Records

Jul. 25, 2018

GDPR Essentials for the Financial Sector: Staying Compliant and Special Challenges (Part Three of Three)

Jul. 18, 2018

Overcoming Barriers to Cross-Border Data Flows, Contract Provisions and Other Digital Transformation Issues

Jul. 18, 2018

GDPR Essentials for the Financial Sector: Compliance Steps (Part Two of Three)

Jul. 18, 2018

What to Expect From California’s Expansive Privacy Legislation

Jul. 11, 2018

GDPR Essentials for the Financial Sector: Benchmarking and Assessing the Risks (Part One of Three)

Jun. 27, 2018

What Are the GDPR’s Implications for Alternative Investment Managers? (Part Two of Two)

Jun. 20, 2018

What Are the GDPR’s Implications for Alternative Investment Managers? (Part One of Two)

Jun. 6, 2018

Analyzing New and Amended State Breach Notification Laws

Jun. 6, 2018

Beyond GDPR: The E.U.’s Expanding Cybersecurity Regime

May 30, 2018

Understanding the Intersection of Law and Artificial Intelligence

May 16, 2018

Crafting a Multinational Employer Social Media Policy After Cambridge Analytica

May 16, 2018

How to Ensure GDPR-Compliant Third-Party Relationships

May 16, 2018

Countdown to GDPR Enforcement: Final Steps and Looking Ahead

May 9, 2018

Building a Customer Privacy Program: Lessons from Dupont’s Privacy Leaders

May 9, 2018

The Right to Be Forgotten: English High Court Details When Google Must Delist Links to Crimes

May 2, 2018

Direct From the Irish Data Commissioner: GDPR Enforcement Priorities (Part Two of Two)

Apr. 25, 2018

Direct From the Irish Data Protection Commissioner: Supervising Facebook (Part One of Two)

Apr. 18, 2018

Ten Common Post-Breach Public Relations Failures and How to Avoid Them

Apr. 11, 2018

Breaking the Cloud: CLOUD Act Brings Data Held Overseas Under U.S. Jurisdiction

Mar. 28, 2018

Evaluating Cybersecurity Coverage in Light of the GDPR

Mar. 28, 2018

EY Global Data Analytics Survey Finds Lack of GDPR Preparedness and Need for Cross-Functional Collaboration

Mar. 28, 2018

When and How Legal and Information Security Should Engage on Cyber Strategy: It Starts With Governance (Part One of Three)

Mar. 28, 2018

Singapore Focuses on Critical Infrastructure With New Cybersecurity Law

Mar. 14, 2018

FTC Enters Into Stiff Settlement With PayPal for Venmo’s Deceptive Practices, but Eases up on a 2009 Sears Order 

Mar. 14, 2018

How Will the GDPR Affect Due Diligence?

Feb. 28, 2018

The GDPR’s Data Subject Rights and Why They Matter

Feb. 28, 2018

Financial Firms Must Supervise Their IT Providers to Avoid CFTC Enforcement Action

Feb. 14, 2018

Dynamic Regulations and Shareholder Actions Guide the Board’s Shifting Role in Cyber (Part Two of Two)

Feb. 14, 2018

NY AG and HHS Flex Regulatory Muscles in Recent Protected Health Information Breach Settlements

Feb. 14, 2018

Using Technology to Comply With the GDPR

Oct. 14, 2015

Privacy and Data Security Considerations for Life Sciences and Health Technology Companies (Part One of Two)

Jan. 31, 2018

Dynamic Regulations and Shareholder Actions Guide the Board’s Shifting Role in Cyber (Part One of Two)

Jan. 31, 2018

Biometric Data Protection Laws and Litigation Strategies (Part One of Two)

Jan. 31, 2018

Lessons and Trends From FTC’s 2017 Privacy and Data Security Update: Enforcement Actions (Part One of Two)

Jan. 17, 2018

A Practical Look at the GDPR’s Data Breach Notification Provision 

Dec. 20, 2017

Five Months Until GDPR Enforcement: Addressing Tricky Questions and Answers

Dec. 20, 2017

How to Make the Most of Limited Resources When Planning the Compliance Budget

Dec. 20, 2017

Benchmarking Employee Monitoring Policies for Practical Approaches

Dec. 6, 2017

Actions Under Biometric Privacy Laws Highlight Related Risks

Nov. 8, 2017

E.U. Data Regulators Weigh in on GDPR Prep in Asia and Across the Globe

Nov. 8, 2017

Managing Data Privacy Across Multiple Jurisdictions

Oct. 25, 2017

Privacy Shield Survives First Annual Review

Oct. 11, 2017

Reconciling Data Localization Laws and the Global Flow of Information

Oct. 11, 2017

Lessons From the Equifax Breach on How to Bolster Incident Response Planning (Part Two of Two)

Oct. 11, 2017

FTC Launches Stick With Security Series, Adding Detail and Guidance to Its Start With Security Guide (Part Two of Two)

Sep. 27, 2017

FTC Settlements in Privacy Shield Cases and With Lenovo Over Use of “Man-in-the-Middle” Software Highlight Vigorous Enforcement Efforts

Sep. 27, 2017

Audit of Websites’ Security, Privacy and Consumer Practices Reveals Deficiencies Despite Overall Progress

Sep. 27, 2017

New Criteria for Employee Monitoring Practices in Light of ECHR Decision

Sep. 27, 2017

Lessons From the Equifax Breach on How to Bolster Incident Response Planning (Part One of Two)

Sep. 13, 2017

Tips and Warnings for Fund Managers When Navigating the Big Data Minefield

Sep. 13, 2017

Focus on Children’s Privacy by FTC and Plaintiffs Calls for Prioritizing COPPA

Aug. 23, 2017

Tips From Google, Chase and P&G Privacy Officers on Developing Strong Privacy Leadership and When to Use Outside Counsel

Aug. 23, 2017

Uber Settlement Highlights Benefits of a Privacy Impact Assessment

Aug. 23, 2017

Implications and Analysis of the E.U.-Canada Data Sharing Agreement Rejection

Jul. 26, 2017

International Law Playing Cybersecurity Catch-Up (Part Two of Two)

Jul. 26, 2017

Best Practices for Managing the Risks of Big Data and Web Scraping

May 31, 2017

Using Big Data Legally and Ethically While Leveraging Its Value (Part Two of Two)

May 31, 2017

One Year Until GDPR Enforcement: Five Steps Companies Should Take Now

May 17, 2017

Using Big Data Legally and Ethically While Leveraging Its Value (Part One of Two)

May 17, 2017

Advice From CPOs on Nurturing Privacy Programs on Any Budget

May 17, 2017

Tracking Data and Maximizing Its Potential

May 3, 2017

European Data Protection Supervisor Offers Advice on Privacy Shield Review and GDPR Preparation

May 3, 2017

Practical and Innovative Permissioning Within the Framework of Europe’s Upcoming Data Protection Regulations

Apr. 19, 2017

Effective and Compliant Employee Monitoring (Part Two of Two)

Apr. 5, 2017

Best Practices for Mitigating Compliance Risks When Investment Advisers Use Social Media 

Apr. 5, 2017

Effective and Compliant Employee Monitoring (Part One of Two) 

Apr. 5, 2017

A Discussion With Ireland’s Data Protection Commissioner Helen Dixon About GDPR Compliance Strategies (Part Two of Two)

Mar. 22, 2017

A Discussion With Ireland’s Data Protection Commissioner Helen Dixon About GDPR Compliance Strategies (Part One of Two)

Mar. 22, 2017

What It Takes to Establish Compliant Social Media Policies for the Workplace

Mar. 22, 2017

Understanding Online Advertising Technology and the Pipeline Process 

Feb. 22, 2017

Lessons for Connected Devices From the FTC’s Warning Against Unexpected Data Collection 

Feb. 22, 2017

Marsh and FireEye Take the Pulse of European Cybersecurity Climate

Feb. 8, 2017

Getting to Know the DPO and How to Adapt Corporate Structure to Comply With GDPR Requirements for the Role (Part Two of Two)

Jan. 25, 2017

Getting to Know the DPO and Adapting Corporate Structure to Comply With the GDPR (Part One of Two)

Jan. 25, 2017

Tracking Consumer Data: DAA Guidance Applies Core Principles to Cross-Device Technology

Jan. 25, 2017

FTC Data Security Enforcement Year-In-Review: Do We Know What “Reasonable” Security Is Yet?

Jan. 11, 2017

Ten Cybersecurity Priorities for 2017

Jan. 11, 2017

FTC Priorities for 2017 and Beyond

Jan. 11, 2017

Privacy, Security Risks and Applicable Regulatory Regimes of Smart TVs

Dec. 14, 2016

Navigating Data Privacy Laws in Cross-Border Investigations

Dec. 14, 2016

Advice From Compliance Officers on Getting the C-Suite to Show You the Money for Your Data Privacy Program

Nov. 30, 2016

How to Respond to Law Enforcement Demands for Geolocation Data and Data Stored Abroad

Nov. 2, 2016

Navigating the Early Months of Privacy Shield Certification Amidst Uncertainty

Nov. 2, 2016

Guide to Getting Your Security Program Certified Under ISO 27001

Oct. 5, 2016

Examining Newly Released Privacy and Security Guidance for the Fast-Driving Development of Autonomous Cars

Oct. 19, 2016

Privacy Leaders Share Key Considerations for Incorporating a Privacy Policy in the Corporate Culture 

Sep. 21, 2016

Staying Cybersecure Without Mobile Device Management

Sep. 7, 2016

Survey Reveals What Keeps Consumers Away From Connectivity and How to Address Their Concerns 

Sep. 7, 2016

Lessons From Consumer Challenges to Email Review Practices

Aug. 24, 2016

How GE’s Global CPO Approaches Shifting Regulations With Dynamic Implications 

Aug. 24, 2016

Maximizing the Benefits of Big Data Within Permissible Bounds 

Aug. 3, 2016

Second Circuit Quashes Warrant for Microsoft to Produce Email Content Stored Overseas 

Aug. 3, 2016

Is Pokémon Go Pushing the Bounds of Mobile App Privacy and Security?

Jul. 20, 2016

Using Data Analytics to Combat Internal Cyber Threats

Jul. 20, 2016

Challenges Facing Chief Privacy Officers

Jul. 20, 2016

Key Requirements of the Newly Approved Privacy Shield

Jul. 6, 2016

Enforcing Consumer Consent: FTC Focuses on Location Tracking and Children’s Privacy

Jul. 6, 2016

How Will Brexit Affect U.K. Data Protection and Privacy Laws?

May 11, 2016

When Do Consumers Have Standing to Sue Over Data Breaches?

May 11, 2016

Privacy Concerns in a Cashless Society

May 11, 2016

SEC Teaches Broker-Dealer a Lesson About Keeping Business Emails Secure

Apr. 27, 2016

Designing Privacy Policies for Products and Devices in the Internet of Things

Apr. 27, 2016

A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: From Data Mapping to Evaluation (Part One of Three)

Apr. 27, 2016

Mitigating the Risks of Using Social Media in the Workplace

Apr. 13, 2016

Study Analyzes How Companies Can Overcome Cybersecurity Challenges and Create Business Value

Apr. 13, 2016

The Regulators’ View of Best Practices for Social Media and Mobile Apps

Apr. 13, 2016

Securing Connected Medical Devices to Ensure Regulatory Compliance and Customer Safety (Part Two of Two)

Apr. 13, 2016

Ten Steps to Minimize Data Privacy and Security Risk and Maximize Compliance

Mar. 16, 2016

Making Sense of Cybersecurity and Privacy Developments in the E.U.

Mar. 16, 2016

FCC Flexes Its Muscles With Proposed Broadband Privacy Rules and Verizon Settlement

Mar. 16, 2016

CSIS’ James Lewis Discusses Balancing Law Enforcement and Privacy

Mar. 2, 2016

Implementing a Privacy by Design Program to Protect Corporate and Consumer Information

Feb. 17, 2016

Legal and Regulatory Expectations for Mobile Device Privacy and Security (Part Two of Two)

Feb. 17, 2016

Deal Struck to Maintain the Transatlantic Data Flow 

Feb. 3, 2016

Safe Harbor 2.0 Agreement Reached

Feb. 3, 2016

Germany Eases Restrictions on Certain Privacy Class Actions

Feb. 3, 2016

Legal and Regulatory Expectations for Mobile Device Privacy and Security (Part One of Two)

Feb. 3, 2016

The FTC’s Big Data Report Helps Companies Maximize Benefits While Staying Compliant

Jan. 20, 2016

The E.U.’s New Rules: Latham & Watkins Partner Gail Crawford Discusses the Network Information Security Directive and the General Data Protection Regulation

Jan. 6, 2016

Keeping Up with Technology and Regulatory Changes in Online Advertising to Mitigate Risks

Jan. 6, 2016

FTC Director Analyzes Its Most Significant 2015 Cyber Cases and Provides a Sneak Peek Into 2016

Jan. 6, 2016

How the Financial Services Sector Can Meet the Cybersecurity Challenge: A Plan for Building a Cyber-Compliance Program (Part Two of Two)

Dec. 9, 2015

Avoiding Privacy Pitfalls While Using Social Media for Internal Investigations

Dec. 9, 2015

The Multifaceted Role of In-House Counsel in Cybersecurity 

Nov. 25, 2015

FTC Loses Its First Data Security Case 

Nov. 25, 2015

Implementing an Effective Cloud Service Provider Compliance Program

Nov. 25, 2015

FTC Chair Addresses the Agency’s Data Privacy Concerns with Cross-Device Tracking

Nov. 11, 2015

How to Reduce Cybersecurity Risks of Bring Your Own Device Policies (Part Two of Two)

Nov. 11, 2015

California Law Enforcement Faces Higher Bar in Acquiring Electronic Information

Oct. 28, 2015

Privacy and Data Security Considerations for Life Sciences and Health Technology Companies (Part Two of Two)

Oct. 28, 2015

Federal Courts Offer a Modern Interpretation of the VHS-Era Video Privacy Protection Act

Oct. 14, 2015

Eight Ways Compliance Officers Can Build Relationships With the “Middle”

Oct. 14, 2015

How to Reduce the Cybersecurity Risks of Bring Your Own Device Policies (Part One of Two)

Oct. 14, 2015

Dangerous Harbor: Analyzing the European Court of Justice Ruling

Sep. 16, 2015

Examining Evolving Legal Ethics in the Age of the Cloud, Mobile Devices and Social Media (Part Two of Two)  

Sep. 16, 2015

The Tension Between Interest-Based Advertising and Data Privacy

Aug. 12, 2015

How the Hospitality Industry Confronts Cybersecurity Threats that Never Take Vacations

Aug. 12, 2015

Navigating the Evolving Mobile Arena Landscape (Part Two of Two)

Aug. 12, 2015

Surveys Find Internal and Third-Party Cybersecurity Risks Among Top Executive Concerns

Jul. 29, 2015

Canada’s Digital Privacy Act: What Businesses Need to Know

Jul. 29, 2015

How to Secure Evolving Mobile Technology and the Data It Collects (Part One of Two)

Jul. 29, 2015

Managing the Increased Individual Risks and Responsibilities of Compliance Officers

Jul. 15, 2015

Understanding and Mitigating Liability Under the Children’s Online Privacy Protection Act

Jul. 1, 2015

Coordinating Legal and Security Teams in the Current Cybersecurity Landscape (Part One of Two)

Jul. 1, 2015

What Companies Need to Know About the FCC’s Actions Against Unwanted Calls and Texts

May 20, 2015

Tackling Privacy and Cybersecurity Challenges While Fostering Innovation in the Internet of Things

May 20, 2015

Establishing Strong Cybersecurity and Data Privacy Leadership: The Roles of the Chief Information Security Officer and Chief Privacy Officer (Part Two of Two)

May 6, 2015

Top Private Practitioners and Public Officials Detail Hot Topics in Cybersecurity and Best Practices for Government Investigations

Apr. 22, 2015

FCC Makes Its Mark on Cybersecurity Enforcement with Record Data Breach Settlement

Apr. 8, 2015

Strategies for Preventing and Handling Cybersecurity Threats from Employees

Apr. 8, 2015

Ten Actions for Effective Data Risk Management

Apr. 8, 2015

The SEC’s Two Primary Theories in Cybersecurity Enforcement Actions

Jan. 18, 2023

A Sensitive Time for Location Data: Tips to Address New Rules and Vendor Standards

Jan. 4, 2023

FTC and $391-Million State AG Case Put Location Data Enforcement on the Map

Nov. 30, 2022

Navigating Evolving Social Media Risks

Nov. 2, 2022

In New Proposal, E.U. Aims to Boost Security of Connected Devices

May 25, 2022

TV Privacy: Will the TV Industry Agree to Standardize Consent on Screen?

May 18, 2022

TV Privacy: Can Old Remotes Handle New Consent Requirements?

Mar. 9, 2022

Securing Emerging Technologies Without Hampering Innovation: Private Sector Challenges

Mar. 2, 2022

Blockchain Recordkeeping Stirs Privacy Concerns

May 19, 2021

Cybersecurity in a 5G World: Tackling the Challenges With Revised Strategies

May 12, 2021

Cybersecurity in a 5G World: Vulnerabilities and Challenges

Apr. 7, 2021

Did Clubhouse Sacrifice Privacy for Innovation? How to Find the Balance 

Jan. 13, 2021

Checklist for IoT Security Audits

Dec. 9, 2020

What the New IoT Act Means for the Private Sector

Nov. 4, 2020

A Guided Tour of Enterprise IoT Device Hazards

Oct. 7, 2020

How to Address Intensifying Enterprise IoT Security Risks

Aug. 12, 2020

Not Just TikTok: How Companies Can Mitigate Risk of Employee Social Media Use

Jul. 8, 2020

Privacy Compliant Return-to-Work Checklist

Jun. 24, 2020

Balancing Privacy Rights and Innovation in Digital Contact Tracing

May 27, 2020

How to Facilitate a Safe and Privacy Compliant Return to Work: Contact Tracing

Apr. 8, 2020

Wide-Ranging Lessons From Notable Breaches in Q1

Mar. 11, 2020

NIST’s New IoT Standard: Inspiring a Wave of New Device Security Guidance

Mar. 4, 2020

NIST’s New IoT Standard: Boosting Security As States Launch Laws

Dec. 18, 2019

FTC Spyware Takedown Highlights Employee Monitoring Privacy Shifts

Jul. 31, 2019

Takeaways From the U.K. ICO’s FaceApp Warning

Apr. 17, 2019

China Establishes Certification Scheme for Mobile App Operators

Apr. 10, 2019

Combatting Privacy Issues Arising From Geolocation Data Use: Five Risk-Mitigation Strategies

Apr. 3, 2019

Combatting Privacy Issues Arising From Geolocation Data Use: Understanding the Legal Landscape

Mar. 27, 2019

Companies May Need to Re-Examine Approach to Breach Response Preparedness According to Experian Survey

Feb. 20, 2019

Fixing the Chinks in Companies’ Cyber Armor: Executives

Oct. 24, 2018

California Enacts Groundbreaking IoT Law and Requires Disclosure of Bot Use

Oct. 17, 2018

Risks and Rewards of Bluetooth Technology

Oct. 3, 2018

Insight on Addressing IoT Privacy Issues From IAPP’s Chief Knowledge Officer

Oct. 3, 2018

Lax Privacy Policies, Security Measures and Vendor Oversight Lead to FTC Settlement for Mobile Phone Manufacturer

May 16, 2018

Crafting a Multinational Employer Social Media Policy After Cambridge Analytica

Mar. 28, 2018

FTC Recommends Greater Transparency, Better Recordkeeping and Further Streamlining of Mobile Security Practices

Mar. 14, 2018

FTC Enters Into Stiff Settlement With PayPal for Venmo’s Deceptive Practices, but Eases up on a 2009 Sears Order 

Dec. 6, 2017

Chasing the Ideal Balance Between Security and Ease of Use: Is AI the Answer?

Nov. 8, 2017

How to Mitigate the Risks of Open-Source Software (Part Two of Two)

Nov. 8, 2017

Understanding and Using Bot Technology to Address Privacy and Security Challenges 

Oct. 11, 2017

Creating Tomorrow’s Code, Today: Designing an Effective Mobile-First Code of Conduct

Oct. 11, 2017

FTC Launches Stick With Security Series, Adding Detail and Guidance to Its Start With Security Guide (Part Two of Two)

Apr. 19, 2017

The Wisdom of Planning Ahead: The Duty to Preserve Backup Tapes, Mobile Devices and Instant Messages

Feb. 22, 2017

Lessons for Connected Devices From the FTC’s Warning Against Unexpected Data Collection 

Jan. 25, 2017

Tracking Consumer Data: DAA Guidance Applies Core Principles to Cross-Device Technology

Jan. 11, 2017

Privacy, Security Risks and Applicable Regulatory Regimes of Smart TVs

Jan. 11, 2017

FTC Priorities for 2017 and Beyond

Dec. 14, 2016

Presidential Commission Recommends Ways For Public and Private Sectors to Improve Cybersecurity 

Nov. 30, 2016

New NIST and DHS IoT Guidance Signal Regulatory Growth 

Nov. 2, 2016

How to Protect Against Weaponized Devices in Light of the Massive Denial-of-Service Attack

Oct. 5, 2016

Examining Newly Released Privacy and Security Guidance for the Fast-Driving Development of Autonomous Cars

Oct. 19, 2016

Finding the Best Ways to Secure Digital Transactions in a Mobile World 

Sep. 21, 2016

Staying Cybersecure Without Mobile Device Management

Aug. 3, 2016

Is Pokémon Go Pushing the Bounds of Mobile App Privacy and Security?

Jun. 8, 2016

Securing the Connected Car: Privacy, Security and Self-Regulation

May 11, 2016

Managing Risk for the Internet of Things in the Current Regulatory Landscape

Apr. 27, 2016

Designing Privacy Policies for Products and Devices in the Internet of Things

Apr. 13, 2016

Securing Connected Medical Devices to Ensure Regulatory Compliance and Customer Safety (Part Two of Two)

Apr. 13, 2016

The Regulators’ View of Best Practices for Social Media and Mobile Apps

Mar. 30, 2016

Securing Connected Medical Devices to Ensure Regulatory Compliance and Customer Safety (Part One of Two)

Feb. 17, 2016

Legal and Regulatory Expectations for Mobile Device Privacy and Security (Part Two of Two)

Feb. 3, 2016

Legal and Regulatory Expectations for Mobile Device Privacy and Security (Part One of Two)

Jan. 6, 2016

FTC Director Analyzes Its Most Significant 2015 Cyber Cases and Provides a Sneak Peek Into 2016

Jan. 6, 2016

Keeping Up with Technology and Regulatory Changes in Online Advertising to Mitigate Risks

Nov. 11, 2015

How to Reduce Cybersecurity Risks of Bring Your Own Device Policies (Part Two of Two)

Oct. 28, 2015

Privacy and Data Security Considerations for Life Sciences and Health Technology Companies (Part Two of Two)

Oct. 14, 2015

Mastercard and U.S. Bancorp Execs Share Tips for Awareness and Prevention of Mushrooming Cyber Risk (Part One of Two)

Oct. 14, 2015

How to Reduce the Cybersecurity Risks of Bring Your Own Device Policies (Part One of Two)

Aug. 26, 2015

Examining Evolving Legal Ethics in the Age of the Cloud, Mobile Devices and Social Media (Part One of Two)

Aug. 12, 2015

Navigating the Evolving Mobile Arena Landscape (Part Two of Two)

Jul. 29, 2015

How to Secure Evolving Mobile Technology and the Data It Collects (Part One of Two)

May 20, 2015

Tackling Privacy and Cybersecurity Challenges While Fostering Innovation in the Internet of Things

Most-Read Articles

  • Jan. 4, 2023
    A Ransomware Tabletop’s 360-Degree Incident Response View: Days One to Four
    • Incident Response
  • Jan. 11, 2023
    Ten Cybersecurity Resolutions for Financial Services Firms in 2023
    • Financial Services Regulation
  • Jan. 4, 2023
    FTC and $391-Million State AG Case Put Location Data Enforcement on the Map
    • Consumer Privacy
  • Jan. 18, 2023
    Scrutiny Over Dark Patterns Presents Further Challenges in Online Contracting
    • Consumer Privacy
  • Jan. 18, 2023
    A Sensitive Time for Location Data: Tips to Address New Rules and Vendor Standards
    • Mobile Technology

Webinar on Compliant International Data Transfers

Listen here to our discussion with our colleagues at Ethos Privacy, which took place on March 1, 2022, on how to approach international data transfer challenges. 

  • Privacy Policy
  • Terms of Use
  • About Us

© 2023 Mergermarket Limited. All rights reserved.

Sign inFree trialForgot password ×

Sorry, we do not recognise the username and password combination you have entered.

Please ensure you have typed your email address correctly and remember that passwords are case sensitive.

You are logged into a maximum of three different browsers/devices.

Please log in with one previously used and go to My Account to manage the browsers/devices you are using.

Forgotten password? Request Details


Not a user? Get a free trial

Thank you.

A reset link has been sent to the email address provided.

Please be aware that the time taken for mail to be delivered is dependent upon your Internet Service Provider. It should normally arrive within 5-15 minutes.

Request Details

Sorry, this email address is not recognised on our system




Thank you, we'll contact you about your trial