Like many websites, BSA’s websites use cookies to ensure the efficient functioning of those websites and give our users the best possible experience. You can learn more about how we use cookies, and how you can change your browser's cookie settings, in our cookies statement. By continuing to use this site without changing your cookie settings, you consent to our use of cookies.
States continued to address various cybersecurity concerns, focusing primarily on public sector concerns. Top public sector concerns in state legislatures were breach notification bills, improving intergovernmental cooperation, updating protocols, and tackling ransomware.
The federal government must update how agencies purchase Information Technology (IT) to use the latest in digital technology. Enterprise business-to business systems have helped the private sector advance, and it is time to move those modern and industry-proven systems to the US government through improved procurement rules.
This document explains the history of the controller/processor distinction and demonstrates how widely that distinction has been adopted in global privacy laws.
Comprehensive privacy legislation must create strong obligations for all companies that handle consumer data. These obligations will only be strong enough to protect consumer privacy and instill trust, though, if they reflect how a company interacts with consumer data.