The Privacy Insider Podcast Ep. 7: David, Goliath, and Data Privacy Part II: Max Schrems
When AI Meets PI: Assessing and Governing AI from a Privacy Perspective
Navigating Emerging Privacy Issues in Financial Services — The Consumer Finance Podcast
The Privacy Insider Podcast Episode 4: Don't Be Evil: In the Hot Seat of Data Privacy, Part 1
The American Privacy Right Act (APRA) explained
Navigating the Regulation Jungle: How to Be Compliant, Work Efficiently, and Stay Sane
Legal Alert | Wiretap Laws in the United States
Business Better Podcast Episode: Cyber Adviser – A Comparison of AI Regulatory Frameworks
Preventative Medicine: Health Care AI Privacy and Cybersecurity – Part 1 — The Good Bot Podcast
Cost of Noncompliance: More Than Just Fines
Will the U.S. Have a GDPR? With Rachael Ormiston of Osano
The Team Continues to Grow: A Conversation With Our Newest Colleague, Kaitlin Clemens — Unauthorized Access Podcast
[Webinar] Midyear Data Privacy Check-in: Trends & Key Updates
Decoding Privacy Laws: Insights for Small to Mid-Sized Businesses — Regulatory Oversight Podcast
No Password Required: Education Lead at Semgrep and Former Czar for Canada’s Election Security
Navigating State Privacy Laws
[Webinar] You Are Here: First Steps in Data Mapping
AGG Talks: Women in Tech Law - Episode 1: Charting the Course: Women Trailblazing in Cybersecurity and Crisis Governance
[Webinar] AI and Data Privacy: Minimizing Risk and Maximizing Opportunity
Work This Way: A Labor & Employment Law Podcast | Episode 14: How Employers Can Navigate Cybersecurity Issues with Brandon Robinson, Maynard Nexsen Attorney
The Hong Kong Government recently submitted its proposed legislative framework to enhance protection of computer systems of critical infrastructure (“Proposal”) to the Legislative Council (“LegCo”) Panel on Security for...more
If you are a customer of CrowdStrike, you are working on recovering from the outage that occurred on July 19, 2024. As if that isn’t enough disruption, CrowdStrike is warning customers that threat actors are taking advantage...more
In the contemporary landscape of manufacturing, a silent revolution is taking place, driven by the integration of artificial intelligence (AI) into various processes. As factories become smarter and more interconnected, AI is...more
Implications for CFIUS Reporting and Review - The Executive Branch, through the National Science and Technology Council and the National Security Council, committed in 2020 to identify that are potentially significant to...more
President Biden’s recent executive order (EO) to manage risks associated with artificial intelligence (AI) is intended to establish new standards governing AI safety, security, and privacy concerns while promoting innovation...more
Host and Troutman Pepper Partner Alan Poole joins in a conversation with Leland Sparks, data center expert and principle at LNS Solutions. In this discussion, Leland describes how gargantuan increases in computing power...more
Welcome to the first edition of our AI Legal News Summer Roundup! With both the temperature and artificial intelligence developments heating up, the time is ripe to provide periodic updates this summer on recent legal...more
While many types of AI have existed in some form for several years, the new generation of sophisticated AI solutions, especially generative AI (“GenAI”), has driven a rise in AI use cases, including tools to create and debug...more
EPA Aims to Mitigate Risk of Cyberattack on Public Water Systems On March 3, 2023, the U.S. Environmental Protection Agency (EPA) issued its Memorandum Addressing Public Water System (PWS) Cybersecurity in Sanitary Surveys or...more
While there have been major developments in areas such as data security, cloud computing, and artificial intelligence over the past year, threat actors are becoming increasingly aggressive, sophisticated, and in some cases,...more
In this episode of the TAG Infrastructure Talks, Troutman Pepper Partner Alan Poole sits down with Brandon Peccoralo, vice president of sales and account management at DataBank, to discuss his background and the significant...more
The much-anticipated Security Assessment Measures for Outbound Data Transfers (hereinafter referred to as "the Measures") of China has already come into effect on September 1, 2022, and on the eve of the effective date, the...more
The UK Department for Digital, Culture, Media & Sport (DCMS) recently extended the deadline for responses to a policy paper issued on May 26, 2022, calling for views on UK data storage and processing infrastructure, security,...more
On June 14, 2022, federal Public Safety Minister Marco Mendicino introduced Bill C-26, An Act Respecting Cyber Security (ARCS). Intended to strengthen cybersecurity of vital services and vital systems, this proposed...more
The new Data Security Law, together with the Cybersecurity Law (effective since June 1, 2017) and the Personal Information Protection Law (which is expected to be formally published later this year) will serve as the three...more
The recent spate of apparently eastern European cyberattacks on important U.S. commercial interests—from SolarWinds to Colonial Pipeline—should force all of us to step back and review how we organize our world. Many crucial...more
On April 19, 2021, the Government of Canada released the 2021 Federal Budget, which, among other things, proposes to allocate $17.6 million over the next five years (and $3.5 million per year afterwards) to the establishment...more
The structured finance sector has seen an expansion of digital infrastructure asset classes and related financings. Digital infrastructure asset classes have grown to include data centers, wireless towers, distributed...more
The U.S. Department of Transportation (DOT) released an update to the agency's policy regarding autonomous vehicles on January 11, 2021. The policy, the Automated Vehicles Comprehensive Plan (The Plan), builds on three...more
HCCA's Basic Compliance Academy is a three-and-a-half-day intensive training program focusing on subject areas at the heart of health care compliance practice. Its faculty is made up of experts in the field. Courses are...more
On September 11, 2020, U.S. Representatives Bill Foster (D-IL), John Katko (R-NY), Jim Langevin (D-RI), and Barry Loudermilk (R-GA) introduced H.R. 8215, the Improving Digital Identity Act of 2020 (“the Act”) to address the...more
In this week’s episode, Ryan Severson discusses the Federal Health IT Strategic Plan, which was recently released by the Office of the National Coordinator for Health Information Technology (“ONC”). Mr. Severson discusses...more
The Federal Bureau of Investigation (FBI) is warning of a heightened likelihood of Iranian cyber-attacks following the escalation of tension between the U.S. and Iran. This follows the warning last week by the Department of...more
After the killing of Qassem Soleimani on January 3, 2020, by the U.S. government, the cybersecurity news industry has been abuzz about whether Iran will engage in cyber terrorism, and if so, to what degree, as part of its...more