• Features

    China Finalizes New Regulations to Relax Personal Data Exports from China

    Lindsay Zhu, Scott Warren, Haowen Xu and Charmian Aw

    Nearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.

    Read More ›

  • Features

    Unraveling The American Data Privacy Patchwork: Will the American Privacy Rights Act Succeed?

    Michael McLaughlin and Andria Adigwe

    As the focus on protecting personal data continues to grow with the ever-widening adoption of artificial intelligence (AI) tools, exponential increases in the number and breadth of data breaches, and growing awareness of the risk posed by data brokers, the time appears right for a U.S. federal data privacy regulation to succeed in Congress. But is the new American Privacy Rights Act that regulation?

    Read More ›

  • Features

    The Perfect Storm: Why Contract Hiring In Privacy Will Eclipse Direct Hiring In 2024

    Jared Coseglia

    With significantly fewer fully remote positions available in 2023, active job seekers were faced with the question of whether to begin considering compromises on work-from-home flexibility or compromise in other areas like compensation, vertical mobility, quality of life, or employment modality.

    Read More ›

  • Features

    Lessons for CISOs from the SolarWinds Breach and SEC Enforcement

    Daniel Garrie, David Cass and Jennifer Deutsch

    In an era where digital threats loom large, the responsibilities of Chief Information Security Officers have expanded beyond traditional IT security to encompass a broader governance, risk management, and compliance role. The infamous SolarWinds Corp. attack illustrates the complex cybersecurity landscape CISOs navigate.

    Read More ›

  • Features

    Shielding Law Practices: Mitigating Vendor Risks to Safeguard Client Confidentiality

    Brad Hibbert

    Because vendors often access clients’ internal systems, customer data, and intellectual property, they will always be a magnet for hackers searching for valuable data. Bad actors will always look for the weak spots in a firm’s defenses, including those deployed by a firm’s vendors and other third parties. And signs point to a growing number of cyberattacks, not a lessening of them.

    Read More ›

  • Features

    A Roadmap for Implementing Information Governance In Law Firms

    Gregg Parker

    In today's digital age, the volume of data generated and managed by law firms has skyrocketed, presenting both opportunities and challenges. Unfortunately, in parallel with this exponential growth in data, and partially as a direct result of it, law firms have also experienced a significant increase in targeted cyberattacks.

    Read More ›

  • Features

    Navigating Custody and Control: Ownership of Smartphone Data and Enforcement of Usage Policies

    Matthew Rasmussen

    New regulations from the DOJ around the ownership and governance of company data on personal devices are catching up to the way the world actually works. It’s going to make companies’ lives a lot harder — and for precisely the same reason that smartphones have made their lives a lot easier.

    Read More ›

  • Features

    Is Genetic Information the Next Privacy Battleground?

    Jeffrey N. Rosenthal and Amanda M. Noonan

    GIPA litigation remains in its early stages, but the possibility of exorbitant statutory damages could make GIPA the next major trend in privacy class action litigation.

    Read More ›


Need Help?