Jodi Daniels from Red Clover Advisors, explains the recent updates to the Washington Privacy Act and its differences and similarities with the CCPA and the GDPR in just 3 minutes!!
Stay tuned with data protection worldwide, follow PrivacyRules!
Jodi Daniels from Red Clover Advisors, explains the recent updates to the Washington Privacy Act and its differences and similarities with the CCPA and the GDPR in just 3 minutes!!
Stay tuned with data protection worldwide, follow PrivacyRules!
With the ever-increasing presence of technology in the workplace and the risks associated with the use of digital tools, information sharing and employees working from home, control measures in Norway are on the rise. Such, measures, ranging from access controls to GPS tracking, are subject to the GDPR as incorporated into the Norwegian Personal Data Act. Furthermore, the Norwegian Working Environment Act and its appurtenant regulations impose several procedural obligations on employers wishing to implement control measures in the workplace. Failure to comply with these obligations could not only expose the employer to potential liability and loss of reputation, but also render any evidence gathered through the measure inadmissible before the Norwegian courts.
Our Norwegian expert, Alexander Mollan from Brækhus Advokatfirma DA, delves into this complicated patchwork of laws in order to provide you with some practical tips on how to avoid any risk dealing with this sector.
What’s the biggest threat to personal privacy in 2021?
Our Chairman and US expert Joe Dehner, Counsel at Frost Brown Todd LLP, reveals how to face the biggest threat of 2021, the splinternet!
But what is the splinternet? How is it related to us, our governments and the entire world?
Learn it with us in this brief video and follow PrivacyRules not to miss our next episodes.
Session 2 has been moderated by Joe Dehner (PrivacyRules Chairman), debating with Kohei Kurihara (Japan), Grace Shaw (Canada), Kevin Warburton (Hong Kong), Ken Morris (USA), and Eric Cook (USA) about:
- Points to consider about data lifecycles: (i) collection and storage, (ii) processing, (iii) transfer (domestic or overseas, intra-group or to third parties), and (iv) deletion
- Points to learn from precedents: what is the main cause of data breaches based on your experience?
- How can you detect and recognize a (potential) data breaches promptly?
- What should be considered in order to establish effective cybersecurity compliance?
Session 1 has been moderated by Akira Matsuda (our host from Japan), debating with Yingyu Wang (Singapore), Jihong Chen (China), Agnieszka Wiercińska-Krużewska (Poland) and Kim Walker (UK) on:
- Establishing an effective compliance system for cross-border data transfers – what should businesses focus on?
- What is the difference between domestic data transfer compliance and international data transfer compliance?
- What is the best way to monitor the data flows?
- How do you comply when a business uses overseas processors?
Data is an important business in Greater China, where distinctive frameworks allow differences to be an opportunity provided that proper guidance and legal advice are ensured to companies operating in and with the various jurisdictions.
Meet our leading members Jihong Chen from China, Pádraig Walsh from Hong Kong, José Leitão from Macau, and John Eastwood from Taiwan debating about how data privacy must be embedded in data related business plans, operations and corporate policies across Greater China.
And the elephant in the room: what happens when such data are transferred with the US? Our Greater China members will analyse relevant aspects with our US member.