The new white paper is timely given recent changes in the cybersecurity risk and regulatory landscape. A key driver of change in cybersecurity risk is the increasing prevalence of agile working arrangements. Organizations that allow remote users with authorized credentials to access information resources may lack insight into who actually is using the credentials and how they are using those resources. Effective cybersecurity programs may therefore require deployment of processes and tools that monitor and assess activities associated with the use of authorized credentials. Such tools include user activity monitoring (UAM) solutions that record and analyze user interactions with and use of applications, databases, and other information resources.
Hogan Lovells’ new white paper does three things:
- Summarizes the key legal issues implicated by such monitoring tools;
- Describes the relevant legal frameworks in 15 major countries, including several European Union member states; and
- Provides practical tips that organizations can adopt when developing global cyber defense programs.
An international team of privacy and cybersecurity lawyers from Hogan Lovells and select firms contributed to the analysis.
While not constituting legal advice, this new Hogan Lovells white paper can be a resource for organizations seeking to assess aspects of their cyber risk management programs.
Read More: Protecting the Workforce and Information in a Global Landscape: A Legal Review
And click here to view a webcast in which Harriet Pearson and James Denvil talk with John Holmes, Forcepoint’s Chief Legal Officer, regarding recent trends and legal developments for cyber-risk management programs.