Latest Posts › Popular

Share:

Simplifying a Complicated Process — Four Steps to Comply with China’s PIPL New Security Assessment Requirements for Cross-Border...

Background on the PIPL Security Assessment. On July 7, China’s top regulator, the Cyberspace Administration of China (CAC), released the final version of the Measures for Security Assessment of Data Exports (Security...more

Investment Management Roundtable Discussion – Data Privacy and Security [Audio]

Gregory J. Nowak, a partner and practice leader for hedge funds in Pepper Hamilton’s Private Fund Services Practice Group, hosts a series of candid, interactive webinar discussions for West LegalEdcenter on what is going on...more

2 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide