110 matches.
- PublicationsProposed HIPAA Security Rule Updates May Significantly Impact Covered Entities and Business Associates20 minute read
- BlogsCalifornia’s AI Revolution: Proposed CPPA Regulations Target Automated Decision Making10 minute read
- BlogsProposed Modernization of the HIPAA Security Rules5 minute read
- BlogsRecent Developments in Health Care Cybersecurity and Oversight: 2024 Wrap Up and 2025 Outlook6 minute read
- Employment Law in 2025: A Look Ahead
- EventsWorkforce (re)silience: Epstein Becker Green's 43rd Annual Workforce Management Briefing2 minute read
- BlogsOCR Withdraws Appeal of District Court Order Declaring Unlawful and Vacating the “Proscribed Combination” Portion of Its HIPAA Online Tracking Technologies Guidance4 minute read
- New DOL Guidance: ERISA Plan Cybersecurity Update
- BlogsDeepfakes: Why Executive Teams Should Prepare for the Cybersecurity and Fraud Risks6 minute read
- BlogsPreparing for the Cybersecurity and Fraud Risks of Deepfakes: What Executive Teams Need to Know6 minute read
- BlogsWhy Executive Teams Should Prepare for the Cybersecurity and Fraud Risks of Deepfakes6 minute read
- Media CoverageBrian Cesaratto Quoted in “New Jersey Legislation to Watch: A Midyear Report”3 minute read
- EventsUnpacking the Legal Challenges in Sourcing AI in Health Care and Life Sciences in the US and the EUJune 17 and 21, 202410 minute read
- BlogsRevised OCR Guidance Provides New Examples, but Raises More Questions, Regarding Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates8 minute read
- Privacy Officer's Roadmap: Data Breach and Ransomware Defense
- BlogsNew Jersey Passes Comprehensive Consumer Privacy Law10 minute read
- BlogsNew Jersey Becomes Most Recent State to Sign a Comprehensive Consumer Privacy Law10 minute read
- California's Upcoming Cyber Audit and Automated Tech Rules
- BlogsCalifornia Privacy Protection Agency Grapples with Cybersecurity Audit, Risk Assessment, Automated Decisionmaking Technology Regulations7 minute read
- PublicationsUSA: Future of Cybersecurity Law and Regulation2 minute read
- BlogsNew York Aims to Bolster Hospital Cybersecurity with Imminent Release of Proposed Regulations3 minute read
- EventsWorkforce (re)newed: Epstein Becker Green's 42nd Annual Workforce Management Briefing2 minute read
- Media CoverageBrian Cesaratto Quoted in “Best Practices for Detecting and Managing Fraud”3 minute read
- EventsACC NYC: Data Rights, Privacy, and Cybersecurity Issues in Contracts with AI Vendors1 minute read
- EventsACC NYC Webinar: Data Rights, Privacy and Cybersecurity Issues in Contracts with AI Vendors1 minute read
- BlogsSEC Adopts Final Cybersecurity Reporting Rule7 minute read
- BlogsSEC Finalizes Cybersecurity Rule: What It Means7 minute read
- BlogsThe California Attorney General and the California Privacy Protection Agency Are Accelerating Enforcement on CCPA/CPRA Noncompliance6 minute read
- BlogsWhite House Releases National Cybersecurity Strategy Implementation Plan7 minute read
- BlogsWhite House Releases National Cybersecurity Strategy Implementation Plan7 minute read
- What Employers Should Know About ChatGPT
- BlogsFTC Brings Enforcement Action Under FTC Act and Health Breach Notification Rule Based on GoodRx’s Use of Advertising Tracking Technology on Its Websites and Mobile Application5 minute read
- BlogsCalifornia Privacy Protection Agency Board Adopts and Approves CCPA Regulations and Discusses Preliminary Rulemaking for Cybersecurity Audits, Risk Assessments, and Automated Decision-Making3 minute read
- BlogsFTC Brings Enforcement Action Under FTC Act and Health Breach Notification Rule Based on GoodRx’s Use of Advertising Tracking Technology on Its Websites and Mobile Application5 minute read
- BlogsCalifornia Privacy Protection Agency Board Adopts and Approves CCPA Regulations and Discusses Preliminary Rulemaking for Cybersecurity Audits, Risk Assessments, and Automated Decision-Making3 minute read
- BlogsHHS Warns HIPAA Covered Entities and Business Associates That Use of Website Cookies, Pixels, and Other Tracking Technology May Violate HIPAA Rules6 minute read
- California Privacy Exemptions Set to Expire, Status of DOL Independent Contractor Rule, D.C. Non-Compete Notices Take Effect
- EventsWorkforce (re)calibrated: Epstein Becker Green’s 41st Annual Workforce Management Briefing4 minute read
- PublicationsTwitter Whistleblower Claim Is Cautionary Tale for Employers2 minute read
- BlogsNo More Exceptions: What to Do When the California Privacy Exemptions for Employee, Applicant and B2B Data Expire on January 1, 20237 minute read
- BlogsNo More Exceptions: What to Do When the California Privacy Exemptions for Employee, Applicant and B2B Data Expire7 minute read
- PublicationsUSA: Employee Monitoring and Regulatory Frameworks for Keylogging Technology2 minute read
- BlogsA Recently-Released “Discussion Draft” of the “American Data Privacy and Protection Act” Provides Insight into Recent Bipartisan Efforts to Pass Nationwide Privacy Law6 minute read
- BlogsTime’s Up: Electronic Monitoring Notice Requirements for New York Employers Take Effect This Week1 minute read
- EventsCybersecurity Best Practices for a Virtual Workforce2 minute read
- BlogsPresident Biden Signs into Law the Cyber Incident Reporting Act, Imposing Reporting Requirements for Cyber Incidents and Ransomware Payments7 minute read
- BlogsPresident Biden Signs into Law Federal Reporting Requirements for Cyber Incidents and Ransomware Payments7 minute read
- BlogsPresident Biden Signs into Law the Cyber Incident and Reporting Act, Mandating Reporting of Cyber Incidents and Ransomware Payments7 minute read
- BlogsCISA Encourages “Shields Up” to Protect Operations and Workers as Cyber War Ramps Up7 minute read
- BlogsCookies Resulting in Cross Border Transfers of Personal Data to the United States Draw Scrutiny from European Data Privacy Regulators7 minute read
- BlogsCISA Encourages “Shields Up” to Protect Organizations as Cyber War Ramps Up in Ukraine7 minute read
- BlogsCookies Resulting in Cross Border Data Transfers to the United States Draw Scrutiny from European Data Privacy Regulators7 minute read
- BlogsCISA Encourages “Shields Up” to Protect Operations and Workers as Cyber War Ramps Up7 minute read
- Firm AnnouncementsEpstein Becker Green’s Brian Cesaratto and Francesco DeLuca Named 2022 BTI Client Service All-Stars3 minute read
- PublicationsNew York Will Require Employers to Provide Notice of Email and Other Electronic Employee Monitoring2 minute read
- PublicationsMonitoring Employee Email or Other Electronic Usage: New York Will Require Employers to Provide Notice8 minute read
- BlogsFTC Warns That Health Apps May Be Subject to the Health Breach Notification Rule6 minute read
- PublicationsUpdates on Biometrics in the Workplace: Scanning the Legal Landscape in New York and Beyond20 minute read
- BlogsIn the Wake of Solar Winds Compromise, CISA and NIST Issue Guidance for Preventing, Defending, and Mitigating Software Supply Chain Attacks6 minute read
- Blogs“NAME:WRECK” Cybersecurity Vulnerability Highlights Importance of Newly Issued IoT Act8 minute read
- BlogsNew Internet of Things (IoT) Cybersecurity Law’s Far Reaching Impacts9 minute read
- PublicationsUnemployment Insurance Fraud: What to Do When It Strikes Your Business and Workers11 minute read
- BlogsBusinesses Should Begin Assessing Their Data Practices in Order to Meet the California Privacy Rights Act Requirements13 minute read
- PublicationsComplying with Enhanced Cybersecurity Safeguards in California2 minute read
- BlogsOrganizations Should Plan in 2021 to Comply with the California Privacy Rights Act’s Enhanced Cybersecurity Safeguards12 minute read
- BlogsHITECH Act Amendment Incentivizes Adoption of NIST and Other Recognized Cybersecurity Safeguards as a Defense or Mitigation to HIPAA Enforcement4 minute read
- 2020 in Review and What's to Come in 2021
- BlogsThe European Data Protection Board Issues Guidance on Cross-Border Data Transfers7 minute read
- BlogsCybersecurity Lessons from the Twitter Hack as New York’s Chief Financial Services Regulator Calls for a Dedicated Cybersecurity Regulator of Large Social Media Companies5 minute read
- BlogsNew York Could Become the First State to Require Cybersecurity CLE5 minute read
- Extended Remote Work, Return-to-Work Manager Training, Case to Watch
- BlogsCybersecurity in the Age of the COVID-19 Remote Worker and Beyond10 minute read
- PublicationsThe Employment Law Review (11th Edition)2 minute read
- BlogsThe New York Department of Financial Services Requests Assurance from Regulated Financial Institutions and Insurance Carriers Regarding Their Preparedness to Respond to COVID-19 Crisis4 minute read
- BlogsThe New York Department of Financial Services Requests Assurance from Regulated Financial Institutions and Insurance Carriers Regarding Their Preparedness to Respond to COVID-19 Crisis3 minute read
- BlogsThe New York State “Stop Hacks and Improve Electronic Data Security Act” (SHIELD Act) Becomes Effective March 21, 2020: Is Your Organization Ready to Achieve Compliance?4 minute read
- EventsLife Insurance Settlement Association – Cybersecurity and Privacy Regulations: Implementing an Effective Information Security Program Compliant with Changing State Laws1 minute read
- EventsProtecting Your Domain Name System (DNS) Security to Avoid Data Loss & Insider Threat1 minute read
- PublicationsNew York Joins the Wave of States Requiring Businesses to Adopt Reasonable Cybersecurity Safeguards to Protect Private Information7 minute read
- BlogsNew York Joins the Wave of States Requiring Businesses to Adopt Reasonable Cybersecurity Safeguards to Protect Private Information5 minute read
- BlogsProposed Amendment to California Consumer Privacy Act (CCPA) Reaffirms Employer Notice Requirement and Employee Private Right of Action for Failure to Implement Cybersecurity Safeguards to Take Effect January 1, 20204 minute read
- BlogsRecent Indictment of Anthem Hackers Serves as a Reminder of the Importance of Rigorous Workforce Cybersecurity Training, Incident Response Plans and Formalized Security Programs6 minute read
- BlogsHarden Your Organization’s Domain Name System (DNS) Security to Protect Against Damaging Data Loss and Insider Threat8 minute read
- PublicationsThe Future of Work: Five Developing Trends for Technology, Media, and Telecommunications Employers9 minute read
- BlogsWashington State Considers Comprehensive Data Privacy Act to Protect Personal Information3 minute read
- PublicationsThe Present-Future of Work: 2018 Trends and 2019 Predictions10 minute read
- EventsEpstein Becker Green’s White Collar Criminal Defense and Internal Investigations Group Cocktail Reception2 minute read
- Employment Law This Week®: Protecting Your Trade Secrets from Insider Threats
- EventsTrends and New Developments Employers Face Protecting Trade Secrets from Insider Threats - Downtown Lunch Roundtable2 minute read
- PublicationsCalifornia’s New Consumer Privacy Act: What Employers Need to Know15 minute read
- BlogsFormal Insider Threat Risk Assessment Program Best Addresses Employee Threats to Critical Technologies1 minute read
- BlogsFormal Insider Threat Risk Assessment Program Best Addresses Employee Threats to Critical Technologies1 minute read
- PublicationsEmployee Threats to Critical Technologies Are Best Addressed Through a Formalized Insider Threat Risk Assessment Process and Program2 minute read
- Publications2017 Wrap-Up & Heads-Up: The Top Workforce Management Issues of 201731 minute read
- PublicationsFive Issues in Focus for Financial Services31 minute read
- BlogsModel Cyber Security Law Pending Final Action By National Association of Insurance Commissioners4 minute read
- BlogsModel Cyber Security Law Pending Final Action By National Association of Insurance Commissioners4 minute read
- Media CoverageRobert Hudock, Brian Cesaratto Featured in "How Employers Can Protect Themselves from Hacks"3 minute read
- BlogsNew York State Issues New Cybersecurity Regulations Following Equifax Breach3 minute read
- EventsManaging Workforce Compliance in an Unpredictable World: Epstein Becker Green's 36th Annual Workforce Management Briefing9 minute read
- PublicationsFive Workforce Management Challenges in Unprecedented Times31 minute read
- PublicationsCyber Threats to Employee Data and Other Confidential Information Are Front and Center in 20172 minute read
- BlogsPhishing Scam Targets Human Resources and Payroll Departments3 minute read
- PublicationsA New Year and a New Administration: Five Employment, Labor & Workforce Management Issues That Employers Should Monitor30 minute read
- Increased Cyber Threats in 2017: An Interview with Brian G. Cesaratto
- Employment Law This Week®: Post-ACA Health Plans, Labor Landscape, Wage and Hour Changes, Increased Cyber Threats, Retirement Plans
- EventsThe Latest on Cybersecurity, Data Loss Prevention, and Data Breach Litigation1 minute read
- EventsThe Impact of Technology in the Courtroom and Boardroom in the 21st Century3 minute read
- Media CoverageNew York Employment Law Letter: Five Takeaways from Recent Supreme Court Privacy Ruling1 minute read
- Firm AnnouncementsEpstein Becker Green Elects New Partners3 minute read