Blog Archives

The Biden Administration’s Blueprint for an AI Bill of Rights

As the use of artificial intelligence (AI) rapidly expands throughout the private sector and government, the Biden administration has published a report titled A Blueprint for an AI Bill of Rights. A summary is available at https://www.whitehouse.gov/ostp/ai-bill-of-rights/ and the full

Tagged with: , , ,
Posted in Artificial Intelligence

SEC Proposes New Cybersecurity Disclosure Rules for Public Companies

On March 9, 2022, the SEC proposed new rules (“Proposed Rules”) that would expand cybersecurity disclosures applicable to public companies subject to the reporting requirements of the Securities Exchange Act of 1934 (“Exchange Act”). Existing SEC rules do not explicitly require cybersecurity

Tagged with: , , , , , ,
Posted in Regulations

Federal Agencies Announce a New 36-Hour Cybersecurity Incident Rule Reporting Requirement

On November 18, 2021, the Office of the Comptroller of the Currency (“OCC”),  the Board of Governors of the Federal Reserve System (“Board”), and the Federal Deposit Insurance Corporation (“FDIC”) (collectively, the “Agencies”) issued a new rule (the “Rule”) that

Tagged with: , , , , , , , , , ,
Posted in Data Breach, Policies and Procedures, Regulations, Standards

FTC’s Amended Safeguards Rule Imposes Significant Requirements on Covered Entities

On October 27, 2021, the Federal Trade Commission (“FTC”) announced new updates to the Gramm-Leach-Bliley Act (“GLBA”) by amending the Standards for Safeguarding Customer Information, known as the “Safeguards Rule,” and issuing a final rule (the “Final Rule”). The Safeguards

Tagged with: , , , , ,
Posted in FTC, GLBA, Regulations

Cybersecurity Best Practices in the Remote-Working Environment

In the wake of the COVID-19 crisis, much of the workforce has shifted to working remotely, with many workers operating out of makeshift “offices” they created in their homes with little or no warning. Along with this remote work comes

Tagged with: , , , , , ,
Posted in Data Security, Policies and Procedures, Privacy, Uncategorized

Eight Best Practices for Avoiding Data Breaches

As data breaches are on the rise, the old adage rings true: it’s not a question of if, but when. More companies are experiencing crippling breaches and the statistics are alarming:  According to IBM Security’s Cost of a Data Breach

Tagged with: , , , ,
Posted in Data Breach, Data Security, Policies and Procedures, Standards

Is Privacy Profitable?

It is evident that a company must invest in its privacy practices to meet legal requirements if it wants to avoid investigation costs and potential civil penalties.  But can investment in privacy, data security, and data management bring benefits to

Tagged with: , ,
Posted in Data Security, Privacy

Year To Date Changes To State Data Breach Notification Laws

With so much attention being paid to the impending California Consumer Privacy Act, it can be easy to forget that other states have privacy and data security laws too.  And those laws change routinely, with potentially significant impacts on businesses. 

Tagged with: , ,
Posted in Data Breach, Data Security

5 Ways in Which Your Company’s Privacy Policy is Insufficient

Well thought-out internal privacy policies and procedures are an essential part of any company’s information management program.  These internal policies should not be confused with a company’s external privacy notice, which informs the company’s customers as to how it may

Tagged with: , , , , ,
Posted in Policies and Procedures, Privacy

Congress Holds Hearings on Privacy and Data Protection

With all of the hubbub swirling around Capitol Hill last week with the Michael Cohen hearings, you can’t be blamed if you missed the fact that two important congressional hearings on privacy and data protection took place as well, one

Tagged with: , , , , ,
Posted in Data Security, Legislation, Privacy
About Cyber Law Monitor
In the new digital world, individuals and businesses are almost entirely dependent on computer technology and electronic communications to function on a daily basis. Although the power of modern technology is a source of opportunity and inspiration—it also poses huge challenges, from protecting privacy and securing proprietary data to adhering to fast-changing statutory and regulatory requirements. The Cyber Law Monitor blog covers privacy, data security, technology, and cyber space. It tracks major legal and policy developments and provides analysis of current events.
Subscribe For Updates

cyberlawmonitor

Cozen O’Connor Blogs