Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Hot Button Enforcement Issues In the New Canadian Consumer Privacy Protection Act Image

Hot Button Enforcement Issues In the New Canadian Consumer Privacy Protection Act

John Beardwood & Shan Arora

Part Four In a Series The conclusion of the series on Canada's recently introduced Consumer Privacy Protection Act looks at hot button enforcement issues in the Act.

Features

The Information Governance Groundhog Day Syndrome Image

The Information Governance Groundhog Day Syndrome

Ben Schmidt & Nathan Curtis

Security and privacy start with good information governance, and for many firms — trying to get their information governance policy implemented feels a lot like Groundhog Day. Yes, the one with Bill Murray. Let's take a closer look.

Features

Compliance for Privacy Officers on the New Canadian Consumer Privacy Protection Act Image

Compliance for Privacy Officers on the New Canadian Consumer Privacy Protection Act

John Beardwood & Shan Arora

Part Three In a Series Part Three continues the analysis of new compliance requirements in Canada's new Consumer Privacy Protection Act, including the content of organizational privacy policies and anonymization of personal information policies, and business transaction policies contained in the Act.

Features

EU Releases Attempt At Comprehensive Cybersecurity Legislation Image

EU Releases Attempt At Comprehensive Cybersecurity Legislation

Cassandre Coyer

The European Union released its first attempt at a comprehensive cybersecurity legislation, the Cyber Resilience Act — and its impact on the technology market could be far-reaching.

Features

FTC Looks to Focus On Data Privacy and Competition Image

FTC Looks to Focus On Data Privacy and Competition

Isha Marathe

The Federal Trade Commission, under its current chairperson Lina Khan, has released a flurry of press releases and blogs in recent months signaling at a focused commercial surveillance "crackdown."

Features

A Compliance Briefing for Privacy Officers on the New Canadian Consumer Privacy Protection Act Image

A Compliance Briefing for Privacy Officers on the New Canadian Consumer Privacy Protection Act

John Beardwood & Shan Arora

Part Two In a Series Part One of this series introduced the history of Canada's recently introduced Consumer Privacy Protection Act and reviewed the similarities with GDPR, such as data portability, the right not be forgotten, codes of practice, and a safe harbor provision. Part Two analyzes the new compliance requirement of valid consent.

Features

Data Rights, Data Duties, & Data Risks: The American Data Privacy and Protection Act Image

Data Rights, Data Duties, & Data Risks: The American Data Privacy and Protection Act

Rita W. Garry

While the ADPPA represents compromises between Democratic and Republican leadership of the U.S. Senate and House of Representatives, particularly around the thorny issues of state law preemption and private rights of action, there are other legislative and big tech industry players pushing their own agendas for comprehensive national data privacy and security frameworks.

Features

Not Just Your Same Old Privacy Legislation: A Compliance Briefing for Privacy Officers on the New Canadian Consumer Privacy Protection Act Image

Not Just Your Same Old Privacy Legislation: A Compliance Briefing for Privacy Officers on the New Canadian Consumer Privacy Protection Act

John Beardwood & Shan Arora

Part One In a Series This article, which reviews the Canadian Consumer Privacy Protection Act, first seeks to identify the delta between the Act and PIPEDA in order to allow privacy officers of organizations that are already PIPEDA compliant to identify the net new compliance requirements under the Act and second, to highlight the provisions of the Act which, if breached, could lead to the imposition of significant fines.

Features

Data Privacy and Security Considerations for Mobile Health App Developers and Their Counsel Image

Data Privacy and Security Considerations for Mobile Health App Developers and Their Counsel

Angela Matney

In light of the evolving legal and regulatory landscape, app developers and their counsel should examine developers' privacy and security practices and take steps to safeguard sensitive data related to reproductive health.

Features

California's Latest Privacy Rulemaking Proposes Further Obligations for Businesses   Image

California's Latest Privacy Rulemaking Proposes Further Obligations for Businesses  

Kyle Fath, Alan Friel, Shea Leitch & David J. Oberly

While the the California Privacy Protection Agency kicked some of the more difficult issues down the road for further consideration, its first draft of proposed Regs is quite comprehensive with respect to the issues addressed. The authority for some of what is proposed is questionable and will likely be challenged in comments, if not judicial action, if such provisions become final.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategic Uses of a Rule 2004 Exam
    While most bankruptcy practitioners are familiar with the basic concepts behind the Rule 2004 exam, some are less familiar with the procedural intricacies of obtaining, conducting, and responding to the exam ' intricacies that often involve practices and procedures adapted from civil discovery that are beyond the scope of pure bankruptcy practice. This article explains.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›