


Recommendations for Data Transfers Post-Schrems II
The EDPB Announces Recommendations for Data Transfers Post-Schrems II
On November 11, 2020, the European Data Protection Board (EDPB) announced that it...

The EDPB Announces Recommendations for Data Transfers Post-Schrems II
The EDPB Announces Recommendations for Data Transfers Post-Schrems II
On November 11, 2020, the European Data Protection Board (EDPB) announced that it...

Simple Steps for Ransomware Risk Mitigation
Simple Steps for Ransomware Risk Mitigation
Ransomware is one of the most prevalent threats an organization may face, regardless of their size or...

Defining the Core Elements of Your Cybersecurity Strategy
Defining the Core Elements of Your Cybersecurity Strategy
The events of 2020 have caused organizations to consider how their business models may...

How to Build a Culture of Cybersecurity
How to Build a Culture of Cybersecurity
The number and severity of cyber-related threats on organizations is increasing and is expected to continue to...

Updating your Data Maps Post-Schrems II
Considerations for Updating your Data Maps Post-Schrems II
In July 2020, after the historic ruling in the Schrems II case, invalidated the EU-US Privacy...

Are You Getting the Most Out of Your Data?
Are You Getting the Most Out of Your Data?
Imagine if you went onto Amazon and there was no search engine, no history of what you viewed, no semblance to...

A Closer Look at Implementing EU Model Clauses and Binding Corporate Rules (“BCRs”)
A Closer Look at Implementing EU Model Clauses and Binding Corporate Rules (“BCRs”)
The Schrems II Ruling
Following the precedent of Schrems I, in...

The Top Potential Implications of the California Privacy Rights Act (“CPRA”) of 2020
A Closer Look at Implementing EU Model Clauses and Binding Corporate Rules (“BCRs”)
On June 24,2020, the state of California announced that it...