You Didn't Get Hacked. Your Vendor Did.

The Conduent Breach, Volvo Group, and the Invisible Web of Third-Party Risk

In January 2026, Volvo Group North America filed a breach notification with the Maine Attorney General confirming that 16,991 of its employees had their personal data stolen. Volvo's own systems were never touched. The company was not hacked. No Volvo server was compromised. No Volvo employee fell for a phishing email. Volvo simply trusted a vendor — and that vendor got hit by ransomware attackers who spent nearly three months inside the network before anyone noticed.

That is the story this article is actually about. Not just the Conduent ransomware attack — which is already one of the largest healthcare data breaches in U.S. history — but the structural reality it exposes. When a Swedish truck manufacturer founded in 1927 ends up in the victim list of a ransomware group targeting a New Jersey-based administrative services company, something fundamental has shifted in the threat landscape. The perimeter is not your firewall anymore. The perimeter is every contract you have ever signed with every vendor who has ever touched your employees' data. And the perimeter is enormous.

The Company That Built the World's Trucks

To understand how Volvo Group ended up in the Conduent breach, you first need to understand what Volvo Group actually is — because a lot of people get it wrong.

AB Volvo was incorporated as a subsidiary of Swedish ball-bearing giant SKF (Svenska Kullagerfabriken) in 1915 — but that date refers to the corporate entity's legal registration, not the start of vehicle manufacturing. The name "Volvo," Latin for "I roll," was registered by SKF that same year for a planned line of specialized bearings that was never brought to market. The automotive venture did not take shape until over a decade later: it was not until August 10, 1926, that AB Volvo formally began preparations for automobile production, and the company traces its operational start to April 14, 1927, when the first series-manufactured Volvo vehicle — the ÖV 4, quickly nicknamed "Jakob" — rolled off the production line at a factory in Hisingen, Gothenburg, Sweden. Volvo Group itself recognizes 1927 as its founding year. (Sources: AB Volvo Wikipedia; Volvo Cars Wikipedia; Volvo Group — The Foundations of Volvo Group)

"What you can't say to me so that everyone can hear, may as well be left unsaid." — An early motto of Volvo founders Assar Gabrielsson and Gustaf Larson, documented in the company's corporate heritage archive and attributed to the culture of the original factory floor in Hisingen, Gothenburg. (Source: Volvo Group — The Foundations of Volvo Group)

The story of that first car's debut is appropriately humbling for a company that would go on to define industrial safety: the differential on the ÖV 4 had been installed upside down, giving it three reverse gears and only one forward. The error was corrected in ten minutes. The press showed up anyway, and only 280 units of the ÖV 4 were ever built. Cars, it turned out, were not where Volvo's future lay.

Trucks were. Within months of the first car's debut, Volvo began work on its first commercial vehicle. The LV Series 1 truck debuted in January 1928 and became an immediate success, attracting international attention almost immediately. Truck profits financed the company's car operations for the next two decades. It was a pattern that would define the company's identity: Volvo was always, at its core, a company that moved heavy things.

1927
First Volvo vehicle rolls off the line in Gothenburg. Only 280 ÖV 4 cars built.
1928
LV Series 1 truck debuts. Immediate commercial success that would fund the company for decades.
1935
AB Volvo lists on the Stockholm Stock Exchange. SKF sells its shares. Volvo becomes fully independent.
1950
Volvo acquires Bolinder-Munktell, a Swedish construction equipment manufacturer. The seed of what becomes Volvo Construction Equipment (VCE) is planted.
1959
Nils Bohlin, Volvo's first chief safety engineer, perfects the three-point safety belt. Volvo makes the patent freely available to the entire automotive industry — a decision credited with saving over one million lives.
1964
The Torslanda plant opens near Gothenburg. Volvo now has the production capacity to serve global markets.
1999
Volvo Group sells its passenger car division — Volvo Cars — to Ford Motor Company for $6.47 billion. The two companies permanently separate.
2000–2001
Volvo Group acquires Renault's truck division (renaming it Renault Trucks) and Mack Trucks. The group becomes one of the world's largest truck manufacturers overnight.
2024
Volvo Group reports SEK 552.8 billion (~$50 billion USD) in net sales. Employs approximately 100,000 people globally across 190 markets.

The three-point safety belt moment deserves more than a footnote. In 1959, Nils Bohlin — recruited to Volvo in 1958 as its first chief safety engineer — designed and patented the modern three-point seatbelt, the lap-and-shoulder configuration still used in every car on the road today. Rather than guarding the patent as a competitive advantage, Volvo made the design freely available to the entire automotive industry at no charge. It is one of the most consequential engineering decisions in transportation history, and it cemented Volvo's identity as a company whose first priority was the safety of the people inside its vehicles. That ethos would eventually extend to its trucks, buses, and construction machinery as well.

One Name, Two Companies: The Great Volvo Divide

Here is where confusion consistently sets in, and it matters for understanding the breach story. Volvo Group (AB Volvo) and Volvo Cars are not the same company. They share a name, a logo, and a city — but they are entirely separate legal and operational entities, and have been since 1999.

When AB Volvo sold its passenger car division to Ford Motor Company for $6.47 billion in January 1999, it was a strategic decision to focus entirely on commercial transport. Ford placed the car business within its Premier Automotive Group, alongside Jaguar, Land Rover, and Aston Martin. Eleven years later, Ford sold Volvo Cars to China's Geely Holding Group for $1.8 billion — a loss of approximately $4.67 billion on its original $6.47 billion purchase — closing the deal on August 2, 2010. Volvo Cars is now majority-owned by Geely and publicly listed on the Nasdaq Stockholm exchange.

Meanwhile, Volvo Group went on a separate acquisition spree. It purchased Renault's truck division and Mack Trucks in 2001, acquired full ownership of Japan's Nissan Diesel (renamed UD Trucks) in 2007, and built out an expansive portfolio that today includes Volvo Trucks, Mack Trucks, Renault Trucks, Volvo Buses, Volvo Construction Equipment, and Volvo Penta (marine and industrial engines). The group operates in over 190 markets and is consistently ranked among the world's two largest manufacturers of heavy-duty trucks.

Know the Difference

Volvo Group (AB Volvo): Swedish-owned. Makes trucks, buses, construction equipment, marine engines. Publicly traded in Stockholm. ~100,000 employees globally. This is the company affected by the Conduent breach. — Volvo Cars: Chinese-owned (Geely Holding Group, majority shareholder). Makes luxury passenger vehicles. Publicly listed on Nasdaq Stockholm since 2021. Entirely separate legal entity since 1999. Not involved in the Conduent breach.

Volvo Group North America is the regional operating arm that manages the group's U.S. business, including Mack Trucks (corporate headquarters in Greensboro, North Carolina; primary manufacturing in Macungie, Pennsylvania) and U.S. operations for Volvo Trucks and other subsidiaries. Like any large multinational employer, it outsources significant portions of its administrative overhead — printing and mailroom services, document processing, payment integrity, benefits administration, and back-office HR support — to specialist third-party providers. One of those providers was Conduent Business Services.

Meet Conduent: The Invisible Infrastructure of Modern Business

Conduent Business Services is headquartered in Florham Park, Morris County, New Jersey. It came into existence on January 3, 2017, as a spin-off from Xerox Corporation — specifically from Xerox's Business Process Services division, which was itself built on Xerox's 2010 acquisition of Affiliated Computer Services (ACS). That lineage matters: Conduent did not build its client base from scratch. It inherited, in one transaction, a sprawling portfolio of long-term government and enterprise contracts that ACS and Xerox had accumulated over decades. It is not a household name, and that obscurity is precisely what makes it so significant from a security standpoint. Conduent is the kind of company that operates the back-office infrastructure of large organizations — processing payroll, administering benefits, running government payment systems, and managing the administrative workflows that most people never think about until something goes wrong.

Its client list reads like a cross-section of American institutional life. Government agencies at the state and federal level. Major health insurers including Blue Cross Blue Shield of Texas, Blue Cross Blue Shield of Montana, Premera Blue Cross, and Humana. Large corporate employers. Public benefit programs including Medicaid and food assistance. When Conduent processes a Medicaid claim in Texas, or administers employee benefits for a trucking company in North Carolina, it is quietly holding some of the most sensitive personal data that exists: names, addresses, Social Security numbers, dates of birth, medical histories, health insurance details, treatment records, and billing information.

"If any insurance giant cut corners or has information that could help us prevent breaches like this in the future, I will work to uncover it." — Texas Attorney General Ken Paxton, announcing his investigation into Conduent and BCBS of Texas, February 2026

Under HIPAA, companies like Conduent that process protected health information on behalf of covered entities — hospitals, insurers, healthcare providers — are classified as Business Associates. That classification carries significant legal obligations. Business Associates must sign formal Business Associate Agreements (BAAs) with each covered entity they serve. They must implement "appropriate administrative, physical, and technical safeguards" to protect PHI. They are not exempt from enforcement simply because they are not the ones providing care. If a Business Associate gets breached, the breach belongs to them — and so does the liability.

The SafePay Attack: Three Months Inside, 8.5 Terabytes Out

Conduent first discovered that its network had been compromised in January 2025. What followed was a ransomware attack claimed by a group called SafePay — a relatively new threat actor that first appeared in September–October 2024 and quickly became one of the most active ransomware operations globally. Technical analysis by researchers at Huntress and Bitdefender identified significant code overlap between SafePay's ransomware binary and the leaked LockBit 3.0 (LockBit Black) source code from late 2022, as well as elements associated with ALPHV/BlackCat and INC Ransom. Whether SafePay represents a rebrand of former operators from those groups or a genuinely independent team that repurposed leaked code has not been conclusively established — though security researchers note that the group's rapid operational scaling and tactical sophistication are more consistent with experienced actors than with genuine newcomers. SafePay operates without affiliates as a closed, centrally managed group — a model that limits the investigative footprint available to researchers and law enforcement. SafePay posted Conduent to its dark web leak site, claiming to have stolen approximately 8.5 terabytes of data, and threatened to release it publicly if ransom demands were not met.

The timeline of the intrusion, once investigators established it, was alarming. Hackers had been inside Conduent's network from October 21, 2024 to January 13, 2025 — nearly three months of undetected access. During that window, attackers methodically moved through the network, identified high-value data stores, and exfiltrated files containing personal information belonging to millions of individuals.

// Conduent Breach Timeline

Oct 21, 2024  — Initial network compromise (later confirmed by forensics)
Oct-Jan       — Sustained, undetected access across Conduent systems
Jan 13, 2025  — Conduent detects and contains the intrusion
Jan 2025      — SafePay claims responsibility; posts Conduent to leak site
Jan 2025      — Service outages hit Wisconsin, Oklahoma government agencies
Oct 2025      — Conduent begins notifying affected individuals by mail
Oct 2025      — Initial victim estimate: ~4 million (Texas), ~10 million total
Feb 2026      — Revised total: 15.4 million in Texas alone, 25+ million nationwide
Apr 15, 2026  — Conduent's self-imposed deadline to complete all notifications

The operational fallout was immediate. In January 2025, government agencies in Wisconsin and Oklahoma experienced service disruptions as Conduent's systems went down, affecting public benefit payments and customer support. The breach had cascaded from a corporate data theft into a disruption of public services for some of the most economically vulnerable populations in those states.

Conduent is no longer listed on the SafePay leak site as of early 2026. The company has not disclosed whether it paid the ransom.

Dwell Time: The Defining Metric

Attackers spent approximately 84 days inside Conduent's network before detection. Industry data consistently shows that longer dwell time directly correlates with greater data exfiltration volume. The average dwell time for ransomware intrusions in 2024 was around 10 days — Conduent's 84-day window was catastrophic by comparison, suggesting significant gaps in network monitoring, anomaly detection, or both.

How 4 Million Became 25 Million

One of the most instructive aspects of the Conduent breach is watching the victim count expand in real time — not because new people were being harmed, but because the company was slowly discovering the true scope of what had already happened.

25M+ Total Americans confirmed affected as of February 2026
15.4M Individuals affected in Texas alone — roughly half the state's population
10.5M Individuals affected in Oregon
8.5 TB Data reportedly stolen by SafePay ransomware group
84 days Estimated attacker dwell time inside Conduent's network

New Hampshire provides the starkest illustration of how breach scope discovery works. In October 2025, Conduent informed the state's Attorney General that approximately 11,000 New Hampshire residents had been affected. Then the numbers kept changing. Letter after letter arrived, each revising the total upward. By February 17, 2026, the confirmed count for New Hampshire alone had surpassed 181,000 — a 16-fold increase from the original estimate, driven by four additional notification updates over a span of four months.

This pattern — initial containment, followed by weeks or months of forensic investigation, followed by progressively larger victim counts — is characteristic of large-scale third-party breaches. The data is spread across multiple systems, client accounts are siloed, and determining exactly which files were accessed and which individuals they pertain to is an enormously complex forensic task. Conduent has stated it found no evidence of attempted or actual misuse of the stolen data as of February 2026, though it has not disclosed what it found regarding ransom payment.

The breach has been classified as among the largest healthcare data breaches in U.S. history. Early court filings described it as the eighth-largest on record — a ranking based on the initial estimate of 10.5 million affected individuals. As the confirmed total has climbed past 25 million, Texas Attorney General Ken Paxton went further, calling it "likely the largest breach in U.S. history." Whether that claim ultimately holds depends on final victim counts still being established, but the trajectory is unambiguous.

The Web: Why Volvo Was a Victim Without Being a Target

Now we return to Volvo Group North America — and this is where the real lesson lives.

Volvo Group is not a healthcare company. It does not treat patients, process insurance claims, or administer Medicaid. It builds trucks. Its Mack Trucks division has been manufacturing heavy commercial vehicles in the United States since 1900, with its corporate headquarters now in Greensboro, North Carolina and its primary manufacturing operations in Macungie, Pennsylvania. Its Volvo Trucks North America division also operates out of Greensboro. Its engineers and factory workers and sales teams deal in engines and powertrains and logistics solutions. None of that is obviously connected to a ransomware attack on a New Jersey administrative services company.

But Volvo Group North America, like virtually every large employer in the United States, outsources portions of its administrative functions to third-party providers. That provider — Conduent — was holding the personal data of 16,991 Volvo Group employees when SafePay hit, providing printing and mailroom services, document processing, payment integrity, and back-office support. And because Conduent's network was compromised, those 16,991 employees had their names, addresses, Social Security numbers, dates of birth, and other sensitive identifiers stolen. Volvo did not learn about it until January 2026 — over a year after the initial breach, and many months after Conduent first began notifying other affected parties.

"Volvo Group only learned of the breach in January 2026, many months after the initial intrusion, illustrating the challenges companies face in tracking the downstream effects of such a massive cyberattack." — Breach analysis reporting on the Maine Attorney General filing

This is what third-party vendor risk looks like in practice. It is not abstract. It is not theoretical. It is a Swedish truck manufacturer founded nearly a century ago, whose employees had their Social Security numbers sitting in a file on a Conduent server in New Jersey, accessible to attackers for 84 days because Conduent did not detect the intrusion.

The Conduent breach was not even Volvo Group's only third-party vendor incident in recent months. In September 2025, the company notified employees of a separate breach at Miljödata, a Swedish IT company hit by ransomware — a reminder that no single vendor relationship represents the full extent of a large organization's third-party exposure. Volvo did nothing wrong in either case. It simply trusted vendors, as every large organization must.

And Volvo is only one entry in a much longer list. Other organizations whose data was exposed through Conduent include:

  • Blue Cross Blue Shield of Texas — whose Medicaid member data accounted for a significant portion of the 15.4 million Texas victims
  • Blue Cross Blue Shield of Montana
  • Premera Blue Cross
  • Humana
  • Multiple state Medicaid programs, including systems in Wisconsin and Oklahoma where service disruptions followed the attack
  • Oregon's state government programs, where 10.5 million residents were affected
  • Delaware, Massachusetts, New Hampshire, and other states with hundreds of thousands of victims each

Every single one of these organizations made a deliberate, rational business decision at some point to outsource administrative functions to a specialized provider. Every single one of them had vendor relationships with Conduent. And every single one of them is now managing the downstream consequences of a breach in a company they did not control, could not monitor, and may not have been adequately vetting.

The Third-Party Risk Problem in One Sentence

Your attack surface is not the sum of your own systems. It is the sum of every system that touches your data — including every vendor, every sub-processor, and every fourth-party relationship your vendors have created that you may not even know about.

The legal response to the Conduent breach has been swift and multifaceted, and it is still unfolding.

State Attorney General Actions

Texas Attorney General Ken Paxton launched a formal investigation on February 12, 2026, issuing Civil Investigative Demands — the legal equivalent of subpoenas — to both Conduent Business Services and Blue Cross Blue Shield of Texas. The investigation focuses on two parallel questions: whether BCBS of Texas adequately monitored and managed its relationship with Conduent, and whether Conduent maintained adequate cybersecurity defenses and complied with Texas data protection law. At least two other states have taken similar investigative actions.

The Texas case is particularly significant because it targets both the breached vendor and its client. This dual-pronged approach signals a regulatory shift: state regulators are no longer content to investigate only the company whose systems were compromised. They want to know whether the client organization exercised adequate vendor oversight before the breach ever happened. That is a fundamentally different standard of accountability than the industry has historically faced.

Federal Class Action Litigation

At least ten federal class action lawsuits have been filed against Conduent Business Services and consolidated in the U.S. District Court for the District of New Jersey under U.S. Magistrate Judge Michael A. Hammer. On December 22, 2025, Judge Hammer appointed an eight-member Plaintiffs' Steering Committee, chaired by Shauna Itri of Seeger Weiss, to coordinate the litigation. The core legal theory across the suits is straightforward: Conduent, as a HIPAA Business Associate holding sensitive personal and health information, had a legal and contractual duty to implement industry-standard security measures, and it failed to do so. That failure caused direct, quantifiable harm to millions of individuals whose data is now circulating in threat actor possession.

The suits further allege that Conduent's delayed notification — the initial intrusion occurred in October 2024, but many individuals were not notified until late 2025 — compounded the harm by leaving victims unaware of the risk to their identities for an extended period.

HIPAA Exposure

In its April 2025 Form 8-K SEC filing, Conduent disclosed that it had earmarked approximately $25 million to cover notification activities, credit monitoring, identity restoration services, and related costs — with $9 million already disbursed at the time of filing. The company's cyber insurance policy is structured to cover any costs that exceed that threshold within the policy's agreed limits. This financial disclosure gives a concrete floor for the direct remediation cost, separate from any litigation exposure or regulatory fines that may follow.

The Department of Health and Human Services Office for Civil Rights (OCR), which enforces HIPAA, is the other critical variable here. In January 2025, HHS OCR issued a Notice of Proposed Rulemaking proposing to substantially revise the HIPAA Security Rule for the first time in a decade — a rulemaking driven in part by the growing frequency and scale of attacks on healthcare data infrastructure. As of the publication of this article, the rule remains in proposed form and has not been finalized; the public comment period concluded in March 2025. If finalized as proposed, the changes would significantly increase technical requirements and administrative obligations for covered entities and their Business Associates. Conduent is squarely in scope. Enforcement actions have not been publicly announced as of this writing, but the scale of the breach — over 25 million individuals, including vast amounts of protected health information — makes OCR scrutiny a near-certainty.

Key Takeaways for Security Teams

The Conduent breach is not unusual. It is representative. The same structural conditions that allowed this breach to unfold — a critical third-party holding massive volumes of sensitive data, inadequate monitoring, an extended dwell time, and delayed downstream discovery — exist in organizations of every size and industry. Here is what the Conduent-Volvo chain of events actually tells security and risk professionals:

  1. Your vendor list is your actual attack surface. Volvo Group's network was never compromised, and none of that mattered. The data was in Conduent's hands, and Conduent's security posture determined the outcome. Every vendor contract that involves the transfer, storage, or processing of employee or customer data is a potential breach vector. Map them. Prioritize them by data sensitivity. Treat them as extensions of your own environment.
  2. Dwell time is the enemy — and 84 days means someone was not watching. SafePay operated inside Conduent's network for nearly three months. That is not a failure of perimeter security alone. It is a failure of internal monitoring, network segmentation, anomaly detection, and incident response. A well-instrumented environment should detect lateral movement, unusual data access volumes, and large-scale exfiltration within hours, not months. The technical controls exist. The question is whether they were deployed, configured, and actively monitored.
  3. HIPAA Business Associate Agreements are not a risk transfer mechanism. Signing a BAA with a vendor does not transfer liability to them and eliminate your own exposure. It creates shared accountability. You are still obligated to assess whether your Business Associates are maintaining the safeguards they are contractually required to maintain. That means vendor security questionnaires, independent audits, and contractual rights to audit. It does not mean signing the BAA and moving on.
  4. Breach scope grows. Plan for it. Every organization that was notified by Conduent in October 2025 received a victim count that would turn out to be wrong — dramatically wrong in some cases. New Hampshire's count grew 16-fold over four months. Your incident response plan should account for rolling disclosures, evolving victim counts, and the communications management burden that comes with each revision. The regulatory clock starts ticking at the moment of discovery, not the moment the final count is known.
  5. The downstream discovery lag is a significant risk on its own. Volvo Group North America did not learn that its employees were affected until January 2026 — over a year after the initial breach. During that entire window, those 16,991 employees had no opportunity to monitor their credit, freeze their files, or take protective action. The contractual and notification framework between Conduent and its clients needs to address downstream notification timelines explicitly, not leave them to the vendor's discretion.
  6. Fourth-party risk is real — and largely invisible. The article's callout box frames the attack surface as including "every fourth-party relationship your vendors have created that you may not even know about." That is not rhetorical. Conduent itself relies on sub-processors and infrastructure partners across its sprawling client portfolio. If any of those downstream relationships were part of the attack path — or if data was co-mingled across client environments in ways that amplified the scope — the originating client organizations would have had zero visibility into that exposure. Standard vendor risk programs assess the vendors you can name. They rarely reach the layer beneath them. A mature third-party risk program needs contractual flow-down requirements: your vendors must disclose their sub-processors, notify you if those sub-processors change, and agree to security standards that extend through the chain. Without that language, you are managing the risk you know about and ignoring the risk you do not.

There is a version of this story that is easy to tell: a big company got hacked, a lot of data got stolen, lawyers got involved, and regulators made statements. That version is boring and it misses the point entirely. The more interesting story — the one that actually helps you defend your organization — is about what Volvo Group and Blue Cross Blue Shield of Texas and the state of Oregon all have in common. None of them were the target. All of them suffered the consequences. They were downstream nodes in a trust network they could not fully see, anchored to a single vendor whose security posture they had no real visibility into.

That is the world security teams operate in now. The perimeter is not a firewall. The perimeter is every contract, every API integration, every payroll processor and benefits administrator and cloud sub-processor that has ever touched data you are responsible for. Conduent is not the last company that will fail in that position. The next one is already processing your employees' Social Security numbers right now. The question is what you know about the locks on that door.

Sources and References

Breach and Legal Filings
Conduent Business Services breach notification, Maine Attorney General Consumer Protection Division (January 2026) —
Conduent Business Services breach notification, New Hampshire Attorney General (October 2025 and subsequent revisions through February 2026) —
Texas Attorney General Ken Paxton press release, February 12, 2026 — Texas AG News Releases
DiCello Levitt PSC appointment announcement, U.S. District Court for the District of New Jersey (December 22, 2025)
Conduent Inc., Form 8-K filing with the U.S. Securities and Exchange Commission (April 2025) — disclosure of $25 million remediation cost commitment and cyber insurance coverage

Breach Coverage
TechCrunch, "Conduent confirms data stolen in January cyberattack" (February 2026) — TechCrunch
SecurityWeek, "Conduent Confirms Data Stolen in Cyberattack; Volvo Among Victims" (February 2026) — SecurityWeek
SecurityWeek, Volvo Group Miljödata breach reporting (September 2025) — SecurityWeek
GovInfo Security, Conduent breach coverage (2025–2026) — GovInfo Security
Mississippi Today, Conduent reporting — Mississippi Today

SafePay Threat Intelligence
Huntress, "Unmasking SafePay Ransomware" (November 2024) —
Bitdefender, "SafePay Ransomware: How a Non-RaaS Group Executes Rapid Fire Attacks" — Bitdefender Business Insights
Blackpoint Cyber, SafePay Ransomware Threat Profile — Blackpoint Cyber
SC Media, "SafePay ransomware: Obscure group uses LockBit builder, claims 22 victims" (November 2024) — SC World

Volvo Group History
Volvo Group corporate heritage archive — volvogroup.com
Volvo Group, "The Three-Point Safety Belt" — volvogroup.com
Volvo Cars Global Media Newsroom, "Zhejiang Geely Completes Acquisition of Volvo Car Corporation" (August 2, 2010) —
HISTORY.com, "U.S. patent issued for three-point seatbelt" — HISTORY
National Inventors Hall of Fame, Nils Bohlin profile — NIHF
Britannica Money, AB Volvo company profile
AB Volvo Wikipedia
Volvo Cars Wikipedia — Wikipedia

Regulatory and Legal Context
HHS Office for Civil Rights, HIPAA Security Rule Notice of Proposed Rulemaking (January 6, 2025) — HHS OCR
Perkins Coie, 2025 Breach Notification Law Update — Perkins Coie
Conduent Inc. Wikipedia — Wikipedia
Xerox Corporation, Conduent separation announcement (January 2017)

Back to all articles