Remove 2002 Remove Education Remove Risk
article thumbnail

2024 Cybersecurity Laws & Regulations

eSecurity Planet

Let’s explore what to expect from the upcoming regulations, provide insights into critical federal and state laws, and offer practical compliance and risk management strategies. These laws aim to establish standards for securing data, ensuring privacy, and mitigating risks associated with digital information.

article thumbnail

FTC Announces Significant Updates to GLB Safeguards Rule

Hunton Privacy

Promulgated in 2002 pursuant to the Gramm-Leach-Bliley Act, the Safeguards Rule obligates covered financial institutions to develop, implement and maintain a comprehensive information security program that complies with the Rule’s requirements. Security Programs. Accountability. Small Businesses.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FTC Investigating Privacy Risks to Data Stored on Digital Copiers

Hunton Privacy

Federal Trade Commission Chairman Jon Leibowitz recently sent a letter to Congressman Edward Markey, Co-Chairman of the bipartisan Congressional Privacy Caucus, announcing that the FTC will address the privacy risks associated with the use of digital copiers.

Privacy 40
article thumbnail

Transition to Electronic Government: Signs of the Time

Preservica

In 2002, I accepted the position of Statewide Records and Forms Coordinator for the Wisconsin Department of Electronic Government (DEG). And, of course, they struggle to keep up with evolving risks and technologies. This post provides a way to explore what the transition to electronic government means for records preservation.

article thumbnail

House Passes Two Cybersecurity Bills

Hunton Privacy

4257), which modifies the Federal Information Security Management Act of 2002 to provide for automated and continuous monitoring of the security of government information systems. House of Representatives approved the Cyber Intelligence Sharing and Protection Act (“CISPA” or H.R. Cyber Intelligence Sharing and Protection Act.

article thumbnail

DOS and DON’TS of a 30(b)(6) Witness Deposition, Part Five

eDiscovery Daily

April 18, 2002). But other privileges may be at risk as well, including: Common Interest Privilege. The risk is that work product and other privileges overlapping as case facts become mixed with trial counsel’s mental processes and legal strategies. Certificates, Inc. Civil Action No. DKC 06-0866 (D. SEC v Rosenfeld , 97 CIV.

article thumbnail

Here’s a Story Where Picking the Right Font Was Never More Important: eDiscovery Trends

eDiscovery Daily

We talk a lot on this blog about the importance of metadata to provide additional useful information in discovery productions and help minimize the risk of fraud. Per Ars Technica , Cambria was designed no earlier than 2004, while Calibri was designed between 2002 and 2004; both only became widely available in 2007.