Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Data privacy and data security concerns have been a constant occurrence since humans began using computers. Along with the rapid proliferation of the internet came the commoditization of consumers’ personal data. This is a direct consequence of businesses’ dependence on data. But, in using the data, companies open themselves up to additional risk. The economic impacts and reputational consequences to businesses are more complex and more significant than ever before. Quickly-evolving global regulations around data protection have triggered sweeping corporate compliance initiatives around the world. Simultaneously, consumers are becoming more knowledgeable about their rights to control access, use, storage and sharing of their personal data. The result is a tremendous responsibility on companies to stand up the necessary processes and controls to protect the personal data of its consumers — immediately. Companies are scrambling to develop a data protection program that aligns with the General Data Protection Regulation (GDPR) and other data protection regulations. As businesses develop data protection frameworks to ensure compliance, it is important for companies to design a data protection program that contemplates data privacy and data security individually, to achieve the most comprehensive data protection program.
Continue reading by getting
started with a subscription.
China Finalizes New Regulations to Relax Personal Data Exports from China
By Lindsay Zhu, Scott Warren, Haowen Xu and Charmian Aw
Nearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.
The Perfect Storm: Why Contract Hiring In Privacy Will Eclipse Direct Hiring In 2024
By Jared Coseglia
With significantly fewer fully remote positions available in 2023, active job seekers were faced with the question of whether to begin considering compromises on work-from-home flexibility or compromise in other areas like compensation, vertical mobility, quality of life, or employment modality.
Lessons for CISOs from the SolarWinds Breach and SEC Enforcement
By Daniel Garrie, David Cass and Jennifer Deutsch
In an era where digital threats loom large, the responsibilities of Chief Information Security Officers have expanded beyond traditional IT security to encompass a broader governance, risk management, and compliance role. The infamous SolarWinds Corp. attack illustrates the complex cybersecurity landscape CISOs navigate.
Shielding Law Practices: Mitigating Vendor Risks to Safeguard Client Confidentiality
By Brad Hibbert
Because vendors often access clients’ internal systems, customer data, and intellectual property, they will always be a magnet for hackers searching for valuable data. Bad actors will always look for the weak spots in a firm’s defenses, including those deployed by a firm’s vendors and other third parties. And signs point to a growing number of cyberattacks, not a lessening of them.