The ability to perform financial transactions online offers tremendous convenience, but also exposes assets to theft and cyber fraud. In addition, the internet of things (IOT) which connects home security systems and other smart devices, creates another access point to personal information and assets. As new technology surfaces, the need to protect accounts, home networks, and family members from cyber hazards grows exponentially. With these proactive best practices, you can limit your personal cyber exposure risk.
Resource Search
In this “Two Byte Conversations” podcast episode, attorney Kevin Angle and Aaron Mendelsohn discuss the ins and outs of building a privacy program and how to work with internal stakeholders and clients to build trust and respect. They also talk about Mr. Mendelsohn’s book, Operationalizing Data Protection & Privacy, his experience teaching cybersecurity and privacy law at Cleveland State University, and their views on what makes an effective legal counselor and privacy officer.
With the ongoing shift from disaster recovery to continuous operations for businesses, it represents more than a technical upgrade—it’s also about how organizations approach risk management, operational planning, and incident response. Addressing the changes, we explore how data center owners and developers can build comprehensive business continuity plans that avoid detrimental down time and mitigate costly compliance violations.
Discover the crucial needs around privacy and risk as AI becomes imbedded in the Family Offices of Tomorrow. Bryan Rhody, Partner, Advisory, Technology Solutions Group, BPM Bill Rouse, Director, Advisory, Technology Solutions Group, Family Office Industry Specialist, BPM Angela Thomas, Sr. Manager, Advisory, Technology Solutions Group & Sage Intacct Practice Leader, BPM
Get ready to comply with the five new data privacy laws that will come into effect in January 2025 in Delaware, Nebraska, Iowa, New Hampshire, and New Jersey. With the active enforcement by several states’ Attorneys General and a trend toward broader applicability, data privacy compliance is becoming increasingly important and complex. Companies should carefully evaluate whether they are subject to any laws coming into effect and take steps to ensure compliance.
As companies and service organizations increasingly use third-party service for outsourced services, there is more demand for a detailed understanding of the processes and controls of these third-party service providers. To show they have the right processes and internal controls in place, it’s crucial to provide a System and Organization Controls (SOC) report.
Safety risk assessments are becoming a preferred regulatory tool around the world. Online safety laws in Australia, Ireland, the United Kingdom, and the United States will require a range of providers to evaluate the safety and user-generated content risks associated with their online services. While the specific assessment requirements vary across jurisdictions, the common thread is that providers will need to establish routine processes to assess, document, and mitigate safety risks.
With the increasingly complex patchwork of state privacy laws and regulatory compliance requirements, businesses operating in regulated industries, particularly in the financial services and healthcare sectors, need to ensure they are paying close attention to the details of the exemptions. Key differences in the exemptions built into these new state laws will result in many regulated businesses having drastically divergent compliance obligations on a state-by-state basis.
The growth of ChatGPT and other artificial intelligence (AI) tools is not slowing down. From small startups to multinational corporations, employees across the spectrum are leveraging ChatGPT to enhance their productivity and streamline their workflows. Given the potential risks—including confidentiality and personal data and privacy violations—associated with the use of ChatGPT and similar tools, it’s crucial for companies to provide guidance to their employees.
The internet and specifically e-commerce has grown exponentially over the last 30 years, incorporating nearly every aspect of trade. As a result, industries and governmental agencies have blossomed to ensure cybersecurity, expending over $150 billion annually to combat this persistent threat. As this market segment continues to expand, crippling cybersecurity intrusions have increased dramatically affecting nearly every sector including finance, health care, infrastructure, and defense systems.