Released in February of 2021, Norton Rose Fulbright’s 16th Annual Litigation Trends Survey highlights up-to-date insight on key US dispute trends including the changes and challenges presented by the COVID-19 pandemic. Additionally, in the areas of cybersecurity and data protection, the survey report notes that disputes have increased over the last several years, with 2020 being no exception. According to the survey report, 44 percent of respondents feel more exposed than they did 12 months prior and respondents report that past attacks have disrupted operations, with others sensing that their company size or industry makes them targets.
According to the recent article from European Digital Rights (EDRi), biometric surveillance dehumanizes us into lifeless bits of data, depriving us of our autonomy and the ability to express who we are. This is even more dangerous when applied to people who reach our countries escaping from violence, economic disasters, and environmental catastrophes. Meeting human beings with biometric surveillance technologies destroys our humanity.
According to Monique Verdier, the deputy chairperson for the Dutch Data Protection Authority, “Facial recognition makes us all walking bar codes. Your face is scanned every time you enter a store, a stadium, or an arena that uses this technology. And it’s done without your consent. By putting your face through a search engine, there is a possibility that your face could be linked to your name and other personal data. This could be done by cross-checking your face with your social media profile, for example.”
According to HaystackID’s Senior Vice President and General Manager for Review Service, Matt Daimler, “Security has always been an essential part of our remote review. But since we first offered it in 2014, we have had to adapt to rapidly changing security risks. Now increased cyber threats and exponential growth in remote work due to the pandemic have driven the need for even greater protection. Our 3.0 platform is the next step in that evolution using cutting-edge, next-generation technology.”
Medical imaging plays an important role in diagnosing and treating patients. The system that manages medical images is known as the picture archiving communication system (PACS) and is nearly ubiquitous in healthcare environments. PACS is defined by the Food and Drug Administration (FDA) as a Class II device that “provides one or more capabilities relating to the acceptance, transfer, display, storage, and digital processing of medical images.” PACS centralizes functions surrounding medical imaging workflows and serves as an authoritative repository of medical image information.
The recently adopted EDPB guidelines on examples regarding data breach notification complement the Article 29 Working Party guidance on data breach notification by introducing more practice-orientated guidance and recommendations. The guidelines, adopted on January 14, 2021, and available for public commentary, aim to help data controllers in deciding how to handle data breaches and what factors to consider during risk assessment.
According to HaystackID’s Chief Innovation Officer and President of Global Investigations, Michael Sarlo, “With the prevalence of data breaches in today’s business world, it is only a matter of time before an organization faces the challenge of a post-data breach incident response. While there are many different solutions for specific incident response tasks, our new ReviewRight Protect service allows us to help companies address these tasks with an integrated service managed by a team of proven data and legal discovery and review experts. Leveraging HaystackID’s extensive data discovery and compliance reporting experience, the new service helps companies quickly identify sensitive data, promptly assess safe and at-risk data, and rapidly respond and report to mitigate data-breach associated risk.”
According to Karen Wetzel, Manager of the NICE Framework, “The NICE Framework building blocks (Tasks, Knowledge, and Skill statements) will unleash a variety of ways in which organizations can use and apply the NICE Framework within their unique context and in a manner that is consistent with the attributes of agility, flexibility, interoperability, and modularity. The introduction of Competencies, a mechanism for organizations to assess learners, is designed to increase alignment among employers, learners, and education and training providers and close the cybersecurity skills gap.”
According to the European Commission, the proposed Regulation on Data Governance (Data Protection Act) will create the basis for a new European way of data governance that is in line with EU values and principles, such as personal data protection (GDPR), consumer protection and competition rules. It offers an alternative model to the data-handling practices of the big tech platforms, which can acquire a high degree of market power because of their business models that imply control of large amounts of data.
The Cyber Law Toolkit is a dynamic interactive web-based resource for legal professionals who work with matters at the intersection of international law and cyber operations. At its heart, the Toolkit currently consists of 19 hypothetical scenarios. Each scenario contains a description of cyber incidents inspired by real-world examples, accompanied by detailed legal analysis. The aim of the analysis is to examine the applicability of international law to the scenarios and the issues they raise. The Toolkit was formally launched on 28 May 2019 in Tallinn, Estonia. Its first general annual update was published on October 2, 2020.