Cybersecurity Law

 

Resource Center / Topic Pages / Cybersecurity Law

Image

Cybersecurity Law

TOPIC PAGE

Navigate Page

On this topic page, you can find the IAPP’s collection of coverage, analysis and resources covering cybersecurity law.

  • expand_more

    Cybersecurity Law Center
    With cybersecurity law and policy becoming a distinct discipline integral to organizations’ legal compliance, data governance and risk mitigation strategies, the IAPP presents the Cybersecurity Law Center to address the need for deeper understanding and wider engagement. The Cybersecurity Law Center provides networking, education, resources and workshop opportunities for lawyers and nonlawyers alike.
    View here

    Cybersecurity Law Fundamentals
    This IAPP textbook serves cybersecurity practitioners looking for a refresher and also guiding generalists and newcomers to the field.
    View here

    Privacy Technology topic page
    On this topic page, you can find the IAPP’s collection of coverage, analysis and resources covering privacy technology.
    View here


News Articles

View all News Articles

Managing third-party risks under EU data protection, cybersecurity laws


US increasing efforts toward cyber regulatory harmonization


Florida bill introduces data breach immunity for entities meeting industry cybersecurity standards


Adverse event reporting and preparing for the next wave of privacy litigation


Lions and tigers and bears, oh my! Global legal risks in cybersecurity investigations


AI incident response plans: Not just for security anymore


California privacy agency lays out vision for cybersecurity regulation


UK product security obligations and liability


Liability for software insecurity: Striking the right balance


Takeaways from Ohio court ruling on ransomware and insurance exclusions


Reporting cyber incident requirements in some Latin American jurisdictions


Is the EDPB’s ‘targeted update’ to data breach reporting guidance a ‘mini-budget’ moment for GDPR regulation?


The evolution of India’s data privacy regime in 2021


Ransomware: 5 critical tips for organizations


FTC Chair Lina Khan opens up on tech enforcement


An inside look at law enforcement response to cyberattacks


What the world of sports teaches us about incident preparedness and response


Comparing EU regulatory norms with incident reporting obligations


Amid a global pandemic, ransomware increasingly targets hospitals


Mass. attorney general stands up Data Privacy, Security Division


How to evaluate your privacy-incident response program


How to operate under Canada’s new breach notification landscape


How to accelerate breach-notification timeframes


Benchmarking for GDPR: How often are orgs reporting data breaches to authorities and subjects?


72 hours and counting: Do’s and don’ts of incident response


How often do notification exceptions apply? We look to the data


View More


Research Articles and Reports

View all Research Articles and Reports

OMB seeks input on policies for commercially available data and AI


FTC adds right to delete to cybersecurity settlement


The FCC issues cybersecurity model for the mobile telecommunications industry


Cybersecurity and the cloud: Lessons from FCC cloud breach enforcement


Private Rights of Action in US Privacy Legislation


Pursuit of app-iness: the legal considerations of SDKs


FTC enforcement trends: From straightforward actions to technical allegations


Major trends in US cybersecurity law and policy


Biased AI systems face the music: Analyzing the FTC’s Rite Aid enforcement


The FTC’s rapidly evolving standards for MFA


State Attorneys General on privacy, cybersecurity, enforcement and legislation


FTC signals expanded breach notice obligations


Key data security insights from FTC CafePress settlement


Hidden privacy lessons in the FTC’s CafePress security enforcement


Ransomware, data protection and compliance


CCPA litigation: Shaping the contours of the private right of action


The evolution of the ‘reasonable security’ standard in the US context


Some Privacy Practices May Result in Under-Reporting of Breach Incidents


Bridging ISO 27001 to GDPR


Benchmarking your Privacy Incident Management Program


How to Shop Smart for Cyberinsurance


View More


Back to Top