CMS Expert Guide: Data Law Navigator (CMS)
Learn about key data protection and cybersecurity laws in this multi-jurisdictional guide.
Learn about key data protection and cybersecurity laws in this multi-jurisdictional guide.
Learn how cyber-insurance can help protect businesses.
This article, developed by Latham & Watkins, covers the new regulatory requirements the US government has been implementing around notifications and disclosures of major cyberattacks and incidents.
In a recent article in Harvard Business Review, a team of researchers showed that 78% of transformations fail. Their analysis showed that “people are the catalysts of successful transformation.” Check out this article to find out how to move beyond working in silos, incremental improvement, and isolated innovation to achieve transformation and why it’s important to have a structured process to engage leadership in setting objectives and guiding transformational change.
This Latham & Watkins article analyzes the proposed rules and advises SEC registrants on how to prepare for compliance with the proposed cyber rules in May of 2022.
The US Supreme Court decision of June 29, 2023 in Groff v DeJoy makes it harder for employers to decline religious accommodation requests.
This article aims to provide a general overview of the European Union's new regulation (EU) 2022/2554 on digital operational resilience for the financial sector, known as the Digital Operational Resilience Act ("DORA").
This article explores how in-house counsel, and particularly those in small and medium businesses, can help bridge the gap between the server room and the boardroom to create a well-structured cybersecurity program that empowers management with the information they need to better assess and prioritize their organization’s cybersecurity spending.
Learn about recent cybersecurity and data protection legislation in China and related security assessments, certification or standard contracts, and restrictions.
Learn about the recent Security Assessment Measures in China and their provisions for three approaches to cross-border transfers of personal information.