When AI Meets PI: Assessing and Governing AI from a Privacy Perspective
The American Privacy Right Act (APRA) explained
Navigating the Regulation Jungle: How to Be Compliant, Work Efficiently, and Stay Sane
Healthcare Document Retention
Legal Alert | Wiretap Laws in the United States
Business Better Podcast Episode: Cyber Adviser – A Comparison of AI Regulatory Frameworks
Cost of Noncompliance: More Than Just Fines
Will the U.S. Have a GDPR? With Rachael Ormiston of Osano
No Password Required: MITRE Engage Lead, Innovator in Cyber Deception, and Dance Community Builder
Navigating State Privacy Laws: A Conversation with Oregon & Texas Regulators about Privacy Enforcement
The Team Continues to Grow: A Conversation With Our Newest Colleague, Kaitlin Clemens — Unauthorized Access Podcast
Episode 326 -- Dottie Schindlinger on Diligent's Report on Board Oversight of Cybersecurity Risks and Performance
[Webinar] Midyear Data Privacy Check-in: Trends & Key Updates
Information Security and ISO 27001
Decoding Privacy Laws: Insights for Small to Mid-Sized Businesses — Regulatory Oversight Podcast
No Password Required: Education Lead at Semgrep and Former Czar for Canada’s Election Security
Navigating State Privacy Laws
[Webinar] You Are Here: First Steps in Data Mapping
Data Centers: Demand, Development, and Future Challenges With Ali Greenwood — TAG Infrastructure Talks Podcast
AGG Talks: Women in Tech Law - Episode 1: Charting the Course: Women Trailblazing in Cybersecurity and Crisis Governance
The Labour Party outlines areas of potential focus for the next UK Parliament. The UK Labour Party won a sizeable parliament majority in the UK general election on July 4, 2024, as it took 411 of the 650 seats in the UK...more
Ali Greenwood, executive director in Cushman & Wakefield's Global Data Center Advisory Group, joins host Alan Poole to discuss historical, current, and future drivers of the demand and velocity of data center construction...more
Host and Troutman Pepper Partner Alan Poole joins in a conversation with Leland Sparks, data center expert and principle at LNS Solutions. In this discussion, Leland describes how gargantuan increases in computing power...more
You may have read storage and operational temperature specifications on a box of newly purchased electronics or somewhere buried in the back of a user manual. Computers, servers, networking equipment, and other electronics...more
On 10 November 2022, the European Parliament approved the Network and Information Security 2 Directive ("NIS 2"), moving a step closer to expanding the scope of the Network and Information Security ("NIS") Directive, the EU's...more
In this episode of the TAG Infrastructure Talks, Troutman Pepper Partner Alan Poole sits down with Brandon Peccoralo, vice president of sales and account management at DataBank, to discuss his background and the significant...more
Due to their specialized function—housing energy intensive IT equipment and 24/7/365 operations—data center facilities often consume over 100 (10 to 50 per floor space) times the quantity of electricity of a similarly sized...more
Thomas Friedman's 2005 book titled The World is Flat discussed how globalization and technology flatten barriers to entry, making the world more competitive. From 2005 to 2021, there is no shortage of examples to highlight...more
The United Kingdom (UK) finally left the EU on 31 January 2020. The withdrawal agreement provides for the UK to continue to be treated largely as an EU member state until the end of the transition period on 31 December 2020,...more
On September 9, 2015, the Federal Service for Supervision of Communications, Information Technology and Mass Communications (the “Roskomnadzor”) reported on its website that it blocked an extensive online database of more...more
A controversial data localization law in Russia that would require businesses to perform data storage and processing with servers located on Russian soil is set to go into effect on September 1, 2015, after an amendment...more
A sometimes overlooked but potentially significant liability exposure for any company that uses the “cloud” to remotely store, process or distribute data is the service provider contract between the company user and its data...more