16 Apr, 2024 Saudi Arabia's developments in technology, media and telecommunications By Lamisse Bajunaid As digital transformation of businesses and economies moves ahead at speed, the Kingdom of Saudi Arabia was particularly active with a...
11 Apr, 2024 CISA Releases Proposed Regulations Implementing New Cybersecurity Reporting Requirements By Brock Dahl Beth George Timothy Howard Megan Kayo Madeline Cimino Andrew Gabel +3 more... Show less On April 4, 2024, the U.S. Cybersecurity and Infrastructure Security Agency (“CISA”) proposed regulations that would create reporting...
09 Apr, 2024 Spring 2024: a safer era for connectable products or just yet more red tape? By Toby Crick Charlie Hawes Antonia Kendrick Now that Spring is around the corner, it’s time to engage with the UK’s security regime for consumer connectable products, with new...
06 Apr, 2024 Prompt engineering for legal: security and risk considerations By Isabel Parker Michal Morrison The emergence of generative artificial intelligence has opened a new field for automating and improving legal services in the...
04 Apr, 2024 Timeline for More CCPA Regulations By Nate Garhart While the California Privacy Protection Agency, in concert with the Attorney General's office, has already begun enforcing the existing...
04 Apr, 2024 Australia summit puts spotlight on cyber intelligence and supply chain security By India Bednall Calvin Lu Wouter Veugelen Transparency and collaboration were the two key themes to come out of Clyde & Co’s 2024 Cyber Summit, which was sponsored by FTI...
02 Apr, 2024 Maximizing and fortifying business value through cybersecurity: Instilling confidence is key By Lukas Weber Stanley Awenlimobor As outlined in our previous article, cybersecurity is not solely a cost center, and can be used to build stronger relationships with...
28 Mar, 2024 With The Fintech Sector's Return to Explosive Growth, Here Are Top U.S. Legal Issues to Watch By Jamillia Ferris Vinita Kailasanath Christine Lyon Jan Rybnicek David Sewell Nathaniel Balk Christine Chong Sora Park Emily Strickland +6 more... Show less Freshfields recently hosted a U.S. Fintech Hot Topics Webinar to highlight on-the-ground insights from our Antitrust and Competition,...
28 Mar, 2024 Building Your Company’s AI Governance Framework By Rikki Haria Theresa Ehlen Christine Lyon Jeanne Queneudec Edward Dean Christine Chong Laura Llangozi +4 more... Show less The use of AI has grown rapidly, from simplistic chatbots to sophisticated conversationalists that are close to passing the Turing test...
25 Mar, 2024 UK data protection regulator publishes updated fining guidance By Christopher Foo On 18 March 2024, the UK data protection regulator (ICO) published updated fining guidance. This update follows the ICO’s consultation in...
22 Mar, 2024 This week in data/cyber/tech: Renewing the UK adequacy decision, criticising the DPDIB, and a Kate Middleton-related data breach. By Edward Machin There's rarely a quiet week in data protection — and this one was no exception. Below are three developments from the past seven days...
18 Mar, 2024 The 'lead claimant' model - the future for data privacy mass claims? By Cat Greenwood-Smith Charlie Fisher The Supreme Court’s ruling in Lloyd v Google (on which we have previously blogged), coupled with the vast upfront costs of bringing...
18 Mar, 2024 European Data Strategy: NIS2 - Keeping you informed By Aselle Ibraimova While NIS2 appears to emphasise that EU member states will identify organisations in scope, it requires organisations themselves to...
15 Mar, 2024 FCC Adopts New Cyber Trust Mark Program for IoT Devices By Nate Garhart Rather than imposing cybersecurity standards for connected devices, the FCC's voluntary Cyber Trust label program will offer...
15 Mar, 2024 This week in data/cyber/tech: verifying data subject rights requests, and drafting (compliant) privacy notices. By Edward Machin There's rarely a quiet week in data protection — and this one was no exception. Below are two developments from the past seven days that...
15 Mar, 2024 Cyber crime, cyber security, cyber resilience By James Gill Fiona Vickerstaff As some will have learnt, it can take decades to build a reputation and just a few minutes of a cyber-incident to ruin it. Even the...