Decrypting India’s Data Protection Regime: The Data Protection Board of India Decrypting India’s Data Protection Regime: The Data Protection Board of India 2025年11月21日
Protection of Personal Data in Tanzania: Addressing the Unlawful Repurposing of Personal Data Protection of Personal Data in Tanzania: Addressing the Unlawful Repurposing of Personal Data 2025年11月11日
Cyber risk is compliance risk: What ASIC’s enforcement actions mean for AFSL holders Cyber risk is compliance risk: What ASIC’s enforcement actions mean for AFSL holders 2025年10月30日
Cyber and privacy law update - accountability gets real Cyber and privacy law update - accountability gets real 2025年10月30日
Recalibrating IT security: Germany’s guidance on IT security and risk governance Recalibrating IT security: Germany’s guidance on IT security and risk governance 2025年10月28日
Criminal Liability for Obstructing Data Subject Access Requests: Lessons from the Bridlington Lodge Criminal Liability for Obstructing Data Subject Access Requests: Lessons from the Bridlington Lodge 2025年10月13日
Lessons from Hamburg Commissioner for Data Protection and Freedom of Information’s €492,000 Fine Lessons from Hamburg Commissioner for Data Protection and Freedom of Information’s €492,000 Fine 2025年10月6日
Introduction of Mandatory Ransomware and Cyber Extortion Payment Reporting Introduction of Mandatory Ransomware and Cyber Extortion Payment Reporting 2025年10月1日
Virtually Everything | Series 3, Episode 5 | Cyber Risks Virtually Everything | Series 3, Episode 5 | Cyber Risks 2025年9月25日
Striking the Balance: Constitutional Guarantee or Statutory Mechanism? Striking the Balance: Constitutional Guarantee or Statutory Mechanism? 2025年9月11日
Virtually Everything | Series 3, Episode 4 | Navigating Payment Tokens 播客 Virtually Everything | Series 3, Episode 4 | Navigating Payment Tokens 2025年9月8日
The Role of Digital Technology and Artificial intelligence, in Transforming Health Insurance in Keny The Role of Digital Technology and Artificial intelligence, in Transforming Health Insurance in Keny 2025年9月3日
Cyber, Digital & Data Protection: Key Updates from Scotland Cyber, Digital & Data Protection: Key Updates from Scotland 2025年8月27日
What Does Consent Look Like Under the Tanzania Personal Data Protection Laws? What Does Consent Look Like Under the Tanzania Personal Data Protection Laws? 2025年8月27日
AI in the Spotlight: Dubai classifies the future of human-machine workflows AI in the Spotlight: Dubai classifies the future of human-machine workflows 2025年8月11日
Virtually Everything | Series 3, Episode 3 | Open Finance 播客 Virtually Everything | Series 3, Episode 3 | Open Finance 2025年7月3日
German court lifts multimillion Euro GDPR fine against Volkswagen German court lifts multimillion Euro GDPR fine against Volkswagen 2025年6月24日
Virtually Everything | Series 3, Episode 2 | Tokenisation Tech & AI evolution Virtually Everything | Series 3, Episode 2 | Tokenisation 2025年6月12日
Virtually Everything | Series 3, Episode 1 | Token2049 播客 Virtually Everything | Series 3, Episode 1 | Token2049 2025年5月28日
The fine print of AI hype: The legal risks of AI washing The fine print of AI hype: The legal risks of AI washing 2025年5月14日
Preparing for enforcement: A Guide to the EU AI Act's market surveillance authorities Preparing for enforcement: A Guide to the EU AI Act's market surveillance authorities 2025年5月13日
Saudi Arabia Personal Data Protection Law: Third public consultation to provide greater clarity on t Saudi Arabia Personal Data Protection Law: Third public consultation to provide greater clarity on t 2025年5月8日
Cyber Risk | Episode 4 | Government ransomware proposals part 2 Cyber Risk | Episode 4 | Government ransomware proposals part 2 2025年4月14日
Quarterly Update Insurance & Reinsurance 01/2025 Quarterly Update Insurance & Reinsurance 01/2025 2025年4月8日
Cyber Risk | Episode 3 | A new direction for ransomware? 播客 Cyber Risk | Episode 3 | A new direction for ransomware? 2025年4月1日
ECJ Ruling on Automated Decision-Making and Data Subject Access Tech & AI evolution ECJ Ruling on Automated Decision-Making and Data Subject Access 2025年3月24日
Update on Saudi Arabia's cross border data transfers: understanding the New Risk Assessment Guidelin Update on Saudi Arabia's cross border data transfers: understanding the New Risk Assessment Guidelin 2025年3月18日
The role of data protection officers under Tanzania’s personal data protection framework The role of data protection officers under Tanzania’s personal data protection framework 2025年3月12日
Singapore: New advisory guidelines to strengthen resilience of cloud services and data centres Singapore: New advisory guidelines to strengthen resilience of cloud services and data centres 2025年3月11日
Cyber Risk | Episode 2 | Improve your cyber readiness – Tabletop exercises Cyber Risk | Episode 2 | Improve your cyber readiness – Tabletop exercises 2025年2月24日
Key obligations for data controllers and data processors under Tanzania’s Personal Data Protection A Key obligations for data controllers and data processors under Tanzania’s Personal Data Protection A 2025年2月13日
Compliance update for healthcare providers: Data Protection Act requirements Compliance update for healthcare providers: Data Protection Act requirements 2025年1月21日
Saudi Arabia's Essential Cybersecurity Controls 2024 (ECC-2): Key Updates and Implications Saudi Arabia's Essential Cybersecurity Controls 2024 (ECC-2): Key Updates and Implications 2025年1月16日
The US Artificial Intelligence Regulatory landscape The US Artificial Intelligence Regulatory landscape 2025年1月14日
A Round Up of Data Breaches 2024 – A Summary of PCPD Reports and What Organisations Can Do to Protec A Round Up of Data Breaches 2024 – A Summary of PCPD Reports and What Organisations Can Do to Protec 2025年1月8日