Eversheds Sutherland Cybersecurity and Privacy Insights Blog
content top

Your quarterly privacy and cybersecurity update

Welcome to the latest edition of Updata – the international quarterly update from Eversheds Sutherland’s dedicated Privacy and Cybersecurity team. Updata provides you with a compilation of privacy and cybersecurity regulatory  and legal updates from our contributors around the globe over the past quarter. This quarter’s report features commentary on a number of important developments,...

Insuring against a data breach in the construction industry

Although hacking attempts may be most commonly directed at financial and health institutions housing troves of financial and personal data, the construction industry is not immune from the risk of a data breach. Like most industries, the construction industry continues to advance in technological innovation—projects are becoming increasingly dependent on mobile connectivity and there...

Newfound consumer privacy focus could transform debate over expiring US surveillance authorities

Last month, partner and co-lead of Eversheds Sutherland’s global cybersecurity and data privacy practice, Michael Bahar, was invited to testify before the US Privacy and Civil Liberties Oversight Board, an independent federal agency tasked with ensuring that efforts to protect the nation from terrorism also appropriately safeguard privacy and civil liberties. The panel was...

Is the CCPA proliferating? A midyear data privacy legislative round-up

While the California Consumer Privacy Act (CCPA) and its potential amendments are still a top concern for businesses, other states are showing that they will not be left behind. With the CCPA still set to go into effect on January 1, 2020, and enforcement delayed until July 2020, we review the major amendments to the CCPA still in play. Not to be outdone by the West Coast, New York is...

The new Swedish Protective Security Act

Sweden has joined a growing number of jurisdictions that have passed strict laws to protect security-sensitive activities including cybersecurity laws that extend beyond the protection of personal data and which extend beyond national borders. Learn more.

« Older Entries Next Entries »