By
Kyle Brasseur2019-09-18T18:44:00
The Ecuadorian government has given itself 72 hours to finish drafting a national privacy law following a massive data breach that put the personal information of perhaps its entire population at risk.
You are not logged in and do not have access to members-only content.
If you are already a registered user or a member, SIGN IN now.
2026-02-02T17:10:00Z By Ruth Prickett
The U.S. action to remove President Nicolás Maduro of Venezuela and reopen access to the country’s oil reserves will have a significant impact on geopolitics and organized crime activities – creating new challenges for global compliance teams.
2026-02-02T12:32:00Z By Ashwathama Rajendran CW guest columnist
Generative AI (GenAI) has moved rapidly from experimentation into day-to-day use across many organizations. Over the past year, teams have shifted from exploratory pilots to relying on these tools for core activities such as contract analysis, research, and software development.
2026-01-29T10:27:00Z By Thad McBride and Jamie Parkinson CW guest columnists
In the current business environment, companies must have a documented plan for responding to government investigations. Shifts in tariffs, dynamic export controls, and a potentially less strict enforcement environment around international bribery all increase the risk that an employee or representative could violate the law – inadvertently or intentionally.
2025-07-07T19:03:00Z By Ian Sherr
A jury in California last week said Google misused cellular data from people who owned smartphones powered by its Android software, and must pay users in the state roughly $314.6 million.
2024-10-08T13:03:00Z By Shelby Brown
The European Union’s Digital Markets Act is forcing many Big Tech companies to postpone the launch of artificial intelligence-powered features, like Apple Intelligence, over user privacy and data security concerns.
2024-08-05T18:05:00Z By Adrianne Appel
Location-based dating apps are not doing enough to protect user privacy, with exact location and other personal data being exploited by stalkers and bad actors, a recent analysis found.
Site powered by Webvision Cloud