Latest Posts › Data Security

Share:

Simplifying a Complicated Process — Four Steps to Comply with China’s PIPL New Security Assessment Requirements for Cross-Border...

Background on the PIPL Security Assessment. On July 7, China’s top regulator, the Cyberspace Administration of China (CAC), released the final version of the Measures for Security Assessment of Data Exports (Security...more

SaaS Transactions: Data-Related Issues in SaaS Agreements - Tech Podcast [Audio]

Troutman Pepper understands the business of technology. We have the privilege of working with great companies, and created an interview series that features our clients, partners, and other guests sharing an eclectic mix of...more

Investment Management Roundtable Discussion – Data Privacy and Security [Audio]

Gregory J. Nowak, a partner and practice leader for hedge funds in Pepper Hamilton’s Private Fund Services Practice Group, hosts a series of candid, interactive webinar discussions for West LegalEdcenter on what is going on...more

3 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide