This article was originally published by IAPP linked here. To begin your week, I recommend reading this Tech Times article on how a programmer accidentally hacked 7,000…
On February 24, 2026, the US Departments of the Treasury and State announced coordinated sanctions targeting a Russia‑based cyber exploit broker network for the…
Baker McKenzie partner, Lothar Determann, authored a chapter titled, “What Cybersecurity Laws Govern,” covering the scope, applicability, and enforcement of international cybersecurity laws, with…
This article was originally published by IAPP linked here. I would like to first note that the odds that Indiana University would win the College…
Key Takeaways: Companion Models are a Primary Focus of Recent Litigation and Lawmaking Although the first wave of chatbot litigation focused heavily on IP…
This article was originally published by IAPP linked here. This “thought for the week” reflects on the geopolitical risks on global data, cyber and…
Heading into 2026, the intersection of technology, regulation and geopolitical dynamics will continue to reshape the global data and cyber landscape. Global businesses will…
Regulations issued under the Personal Data Protection Law In brief More than five years after the publication of Personal Data Protection Law No. 151…
On 1 January 2026, Hong Kong’s Protection of Critical Infrastructures (Computer Systems) Ordinance (Cap. 653) (the “Ordinance“) came into force, ushering in a new…