Rapid rulemaking and aggressive enforcement by the SEC, combined with legislative, judicial, and regulatory developments, have created new requirements and expectations for U.S. public companies.
https://datamatters.sidley.com/wp-content/uploads/sites/2/2025/01/MN-24013-Data-Matters-Blog-Imagery-Refresh_B_10.jpg606833Sonia Gupta Barroshttps://datamatters.sidley.com/wp-content/uploads/sites/2/2022/09/sidleyLogo-e1643922598198.pngSonia Gupta Barros2025-01-17 11:16:042025-01-17 11:16:04Action Items for U.S. Public Companies for 2025
Tokenization of real-world assets (RWAs) is revolutionizing the way we perceive and manage assets. “Tokenized RWAs,” or more simply the digital representation of physical or intangible assets using a token recorded on a blockchain, allows for the efficient recording, trading, transferring, and managing of tangible assets in a digital format.
https://datamatters.sidley.com/wp-content/uploads/sites/2/2022/09/sidleyLogo-e1643922598198.png00Andrew J. Siosonhttps://datamatters.sidley.com/wp-content/uploads/sites/2/2022/09/sidleyLogo-e1643922598198.pngAndrew J. Sioson2025-01-16 10:40:542025-01-16 10:40:542025 Will Be a Brave New Tokenized World
Check out the December issue of Spotlight on Women in Privacy, featuring Nathalie Barrera. Nathalie discusses her role as a privacy attorney at Palo Alto Networks, the importance of continuous learning, and some of the key developments she will be watching out for.
https://datamatters.sidley.com/wp-content/uploads/sites/2/2024/12/MN-24013-Data-Matters-Blog-Imagery-Refresh_A_5-1.jpg606833Data Matters Contributorshttps://datamatters.sidley.com/wp-content/uploads/sites/2/2022/09/sidleyLogo-e1643922598198.pngData Matters Contributors2025-01-14 13:16:562025-01-14 13:16:56Spotlight on Women in Privacy: Nathalie Barrera
On January 3, 2025, the U.S. Department of Commerce Bureau of Industry and Security (BIS) Office of Information and Communications Technology and Services (OICTS) published an Advance Notice of Proposed Rulemaking (ANPRM) on the national security risks posed by foreign adversary involvement in the supply chain for unmanned aerial systems (UAS) (i.e., drones), including risks to critical infrastructure and U.S. sensitive data. BIS seeks public input to inform regulations on the supply of certain UAS components developed by entities linked to the People’s Republic of China (China) and Russia.
https://datamatters.sidley.com/wp-content/uploads/sites/2/2022/09/sidleyLogo-e1643922598198.png00Jen Fernandezhttps://datamatters.sidley.com/wp-content/uploads/sites/2/2022/09/sidleyLogo-e1643922598198.pngJen Fernandez2025-01-10 09:05:102025-01-09 15:54:16U.S. Department of Commerce Seeks to Protect Drones Supply Chain From Foreign Adversaries
The new year brings with it several state privacy law developments, including the effective dates for comprehensive privacy legislation in Delaware, Iowa, Nebraska, New Hampshire and New Jersey. Among this flurry of new state law obligations, however, privacy officers should not lose sight of continuing developments in states that helped pioneer the wave of state privacy laws, such as in Colorado.
Several categories of UK financial services firms, including banks, insurers, electronic money institutions, and payment institutions, are required to comply with new requirements on operational resilience beginning 31 March 2025.
https://datamatters.sidley.com/wp-content/uploads/sites/2/2022/09/sidleyLogo-e1643922598198.png00Francesca Blythehttps://datamatters.sidley.com/wp-content/uploads/sites/2/2022/09/sidleyLogo-e1643922598198.pngFrancesca Blythe2025-01-07 10:39:472025-01-07 10:39:47UK Operational Resilience Rules: Are You Ready for 31 March 2025?
On December 19, 2024, the Chief Counsel of the U.S. Department of Transportation’s National Highway Traffic Safety Administration (NHTSA or the Agency) signed a notice of proposed rulemaking (NPRM) in which the Agency proposed a sweeping voluntary program relating to the evaluation and oversight of motor vehicles equipped with automated driving systems (ADS). NHTSA defines ADS-equipped vehicles, which can also be called autonomous vehicles (AVs), as vehicles designed to fully perform the driving task without any expectation of an attentive human driver.
https://datamatters.sidley.com/wp-content/uploads/sites/2/2024/12/MN-24013-Data-Matters-Blog-Imagery-Refresh_B_8.jpg606833Justin A. Savagehttps://datamatters.sidley.com/wp-content/uploads/sites/2/2022/09/sidleyLogo-e1643922598198.pngJustin A. Savage2024-12-31 10:08:032024-12-31 10:08:03NHTSA Proposes Sweeping Voluntary Program for Vehicles With Automated Driving Systems
As 2024 draws to a close, we look ahead to notable upcoming cyber developments in the new year. From the adoption of new cyber laws to the initiation of infringement proceedings by the European Commission against a number of EU Member States for alleged failures to adequately implement the EU Network and Information Systems Security 2 Directive, the EU continues to emphasize cybersecurity in a rapidly evolving legal and technological environment. There are no signs of this momentum slowing down in 2025.
https://datamatters.sidley.com/wp-content/uploads/sites/2/2022/09/sidleyLogo-e1643922598198.png00Francesca Blythehttps://datamatters.sidley.com/wp-content/uploads/sites/2/2022/09/sidleyLogo-e1643922598198.pngFrancesca Blythe2024-12-23 12:21:342024-12-23 12:21:34Looking Ahead to 2025 in EU Cybersecurity Developments
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
Action Items for U.S. Public Companies for 2025
Rapid rulemaking and aggressive enforcement by the SEC, combined with legislative, judicial, and regulatory developments, have created new requirements and expectations for U.S. public companies.
(more…)
Sonia Gupta Barros
Washington, D.C.
sbarros@sidley.com
Beth E. Berg
Chicago
bberg@sidley.com
Paul L. Choi
Chicago
pchoi@sidley.com
Samir A. Gandhi
New York
sgandhi@sidley.com
John P. Kelsh
Chicago
jkelsh@sidley.com
Claire H. Holland
Chicago
cholland@sidley.com
2025 Will Be a Brave New Tokenized World
Tokenization of real-world assets (RWAs) is revolutionizing the way we perceive and manage assets. “Tokenized RWAs,” or more simply the digital representation of physical or intangible assets using a token recorded on a blockchain, allows for the efficient recording, trading, transferring, and managing of tangible assets in a digital format.
(more…)
Andrew J. Sioson
Washington, D.C.
asioson@sidley.com
Lilya Tessler
Dallas, Miami
ltessler@sidley.com
Erika Cabo
Miami
erika.cabo@sidley.com
Spotlight on Women in Privacy: Nathalie Barrera
Check out the December issue of Spotlight on Women in Privacy, featuring Nathalie Barrera. Nathalie discusses her role as a privacy attorney at Palo Alto Networks, the importance of continuous learning, and some of the key developments she will be watching out for.
(more…)
Data Matters Contributors
sidleyprivacyblog@sidley.com
U.S. Department of Commerce Seeks to Protect Drones Supply Chain From Foreign Adversaries
On January 3, 2025, the U.S. Department of Commerce Bureau of Industry and Security (BIS) Office of Information and Communications Technology and Services (OICTS) published an Advance Notice of Proposed Rulemaking (ANPRM) on the national security risks posed by foreign adversary involvement in the supply chain for unmanned aerial systems (UAS) (i.e., drones), including risks to critical infrastructure and U.S. sensitive data. BIS seeks public input to inform regulations on the supply of certain UAS components developed by entities linked to the People’s Republic of China (China) and Russia.
(more…)
Jen Fernandez
Washington, D.C.
jen.fernandez@sidley.com
Heather Hedges
Washington, D.C.
hhedges@sidley.com
Colorado Finalizes Privacy Act Rules: Key Updates for Businesses
The new year brings with it several state privacy law developments, including the effective dates for comprehensive privacy legislation in Delaware, Iowa, Nebraska, New Hampshire and New Jersey. Among this flurry of new state law obligations, however, privacy officers should not lose sight of continuing developments in states that helped pioneer the wave of state privacy laws, such as in Colorado.
(more…)
Colleen Theresa Brown
Washington, D.C.
cbrown@sidley.com
Ben Cross
Chicago
bcross@sidley.com
Sheri Porath Rockwell
Century City
sheri.rockwell@sidley.com
Lauren Kitces
Washington, D.C.
lkitces@sidley.com
Joyce Yeager
Knowledge Management Lawyer
jyeager@sidley.com
UK Operational Resilience Rules: Are You Ready for 31 March 2025?
Several categories of UK financial services firms, including banks, insurers, electronic money institutions, and payment institutions, are required to comply with new requirements on operational resilience beginning 31 March 2025.
(more…)
Francesca Blythe
London
fblythe@sidley.com
James Phythian-Adams
London
jphythianadams@sidley.com
Max Charles Savoie
London
msavoie@sidley.com
Eleanor Dodding
London
edodding@sidley.com
Paida Manhambara
London
pmanhambara@sidley.com
Julie Rodriguez
London
julie.rodriguez@sidley.com
NHTSA Proposes Sweeping Voluntary Program for Vehicles With Automated Driving Systems
On December 19, 2024, the Chief Counsel of the U.S. Department of Transportation’s National Highway Traffic Safety Administration (NHTSA or the Agency) signed a notice of proposed rulemaking (NPRM) in which the Agency proposed a sweeping voluntary program relating to the evaluation and oversight of motor vehicles equipped with automated driving systems (ADS). NHTSA defines ADS-equipped vehicles, which can also be called autonomous vehicles (AVs), as vehicles designed to fully perform the driving task without any expectation of an attentive human driver.
(more…)
Justin A. Savage
Washington, D.C.
jsavage@sidley.com
Rose Quam-Wickham
Washington, D.C.
rquamwickham@sidley.com
Lauren E. DeCarlo
Chicago
lauren.decarlo@sidley.com
Looking Ahead to 2025 in EU Cybersecurity Developments
As 2024 draws to a close, we look ahead to notable upcoming cyber developments in the new year. From the adoption of new cyber laws to the initiation of infringement proceedings by the European Commission against a number of EU Member States for alleged failures to adequately implement the EU Network and Information Systems Security 2 Directive, the EU continues to emphasize cybersecurity in a rapidly evolving legal and technological environment. There are no signs of this momentum slowing down in 2025.
(more…)
Francesca Blythe
London
fblythe@sidley.com
Lauren Cuyvers
Brussels
lcuyvers@sidley.com
William RM Long
London
wlong@sidley.com
Upcoming Events
Resources
Meet the Team
Kwaku A. Akowuah
kakowuah@sidley.com
Sheila A.G. Armbrust
sarmbrust@sidley.com
Francesca Blythe
fblythe@sidley.com
Colleen Theresa Brown
ctbrown@sidley.com
John M. Casanova
jcasanova@sidley.com
Thomas D. Cunningham
tcunningham@sidley.com
Sharon R. Flanagan
sflanagan@sidley.com
David A. Gordon
dgordon@sidley.com
Tomoki Ishiara
tishiara@sidley.com
Amy P. Lally
alally@sidley.com
David C. Lashway
dlashway@sidley.com
William RM Long
wlong@sidley.com
Joan M. Loughnane
jloughnane@sidley.com
Geeta Malhotra
gmalhotra@sidley.com
Glenn G. Nash
gnash@sidley.com
Rollin A. Ransom
rransom@sidley.com
Alan Charles Raul
araul@sidley.com
Jennifer B. Seale
jseale@sidley.com
Yuet Ming Tham
ytham@sidley.com
Jonathan M. Wilan
jwilan@sidley.com
John W. Woods Jr.
jwoods@sidley.com