Latest Posts › Popular

Share:

California Privacy Rights Act: A Move Closer to GDPR? Part II

In Part II of this series, California-based Ali Baiardo, and London-based Alice O’Donovan, continue their comparison of the GDPR and California privacy law. ...more

California Privacy Rights Act: A Move Closer to GDPR? Part I

The recently-passed California Privacy Rights Act (CPRA) augments and supplements California’s existing privacy law, the California Consumer Privacy Act (CCPA). We are sure many practitioners are wondering how it stacks up...more

AG Submits Final CCPA Regulations—Is Enforcement Still on Track for July 1, 2020?

On June 1, 2020, the California Attorney General submitted the final text of the CCPA Regulations to the California Office of Administrative Law (the “OAL”). This was the last step the AG needed to take before the...more

Update: Coronavirus Cyberscams and Other Attacks – Scammers Are Still at It

The global coronavirus pandemic continues on, and the cyberattacks and scams continue to multiply. In the midst of the pandemic, hackers are capitalizing on fears surrounding the outbreak by crafting COVID-19-themed attacks...more

California Attorney General’s Second Set of Modified CCPA Regulations: Undoing, Redoing, Clarifying

Here we go again. On March 11, 2020, the California Attorney General (AG) published a second set of modifications to its Regulations under the California Consumer Privacy Act. Unlike the AG’s modifications from just last...more

California Attorney General’s Modified CCPA Regulations: Top Ten Changes

On February 7, 2020, the California Attorney General (AG) published a set of Modified Regulations under the California Consumer Privacy Act (CCPA). The Modified Regulations take into account some of the comments received...more

What is Your Family Office Doing to Protect Itself From Security Threats? (Part III)

Welcome back to our three-part series examining cyber vulnerabilities surrounding family offices and steps they can take to mitigate those risks. In Part One we discussed how family offices are particularly vulnerable to...more

What is Your Family Office Doing to Protect Itself From Security Threats? (Part II)

Welcome back to our three-part series examining vulnerabilities surrounding family offices and steps they can take to mitigate those risks. In Part One we discussed how family offices are particularly vulnerable to...more

8 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide