The emergence of deepfakes is reshaping the legal landscape, raising critical questions about privacy, security, and regulation. In our latest whitepaper, Rolling in the Deepfakes: Generative AI, Privacy and Regulation , we delve into these issues to provide you...
South Korea was an early starter in the development of artificial intelligence but now fears losing the race as countries outside the US and China are fast catching up with multi-billion-dollar support packages, South Korea's most influential AI expert at Naver...
As a prominent retail conglomerate with shopping malls, supermarkets, and department stores, our customer was eager to capitalise on China's booming consumer market. But navigating the complex legal and regulatory landscape proved challenging. Challenges: The...
As a prominent real estate and retail industry conglomerate headquartered in Hong Kong, the customer has extensive operations across the Hong Kong and Mainland China market. With a thriving consumer membership program, the company has amassed a substantial repository...
Privacy Management Programmes (PMP) are designed to assist organisations with building a robust privacy infrastructure to manage the privacy risks associated with the handling of personal data. While the Personal Data (Privacy) Ordinance (Cap 486) (PDPO) does...
Your Complimentary Responding to Data Breaches on Practical Guidance Is your organisation well prepared to respond appropriately to a data breach incident? How can you effectively mitigate the threat of loss or damage arising from cybercrime? Part of your...
Unlock the insights and practical implications of the recently released Regulations for Promoting and Standardising Cross-Border Data Transfer (CBDT Regs) by the Cyberspace Administration of China, as this in-depth article delves into the changes and their impact...
Find out how you can strengthen your business' security posture. Enterprise data security threats pose a persistent challenge, yet General Counsel (GCs) express declining confidence in their organisations' preparedness. With executives tackling breach mitigation...
Complimentary Intellectual Property Internal Audit Template and checklist Introducing our latest whitepaper - " Intellectual Property Internal Audit Checklist " Download this checklist now to discover actionable strategies for ascertaining the company...
Complimentary Data Privacy Compliance Checklist Introducing our latest whitepaper - " Data Privacy Compliance Checklist " Download this holistic checklist now for an all-encompassing reference point of procedures with regard to use of employees' personal...
Complimentary Practical Cyber Risk Management Checklist Introducing our latest whitepaper - " Practical Cyber Risk Management Checklist " Malicious cyber activity against individuals, businesses and government agencies is on the rise. Do not just rely...
Complimentary Handling Data Access Requests Checklist Introducing our latest whitepaper - " Handling Data Access Requests Checklist " Unless there are grounds which permit or require the Data User to refuse to comply, organisations must respond to data...
Top Tips & Best Practices for Smaller and Mid-Sized Firms Introducing our latest whitepaper - " Cybersecurity for Law Firms " As cyber threats continue to grow, law firms of every size are increasingly vulnerable to cyberattacks , as they handle sensitive...
Watch On-Demand - CEO Fraud Alert: Fighting Deepfake in Cybersecurity The surge in CEO frauds and deep fakes poses an imminent threat to businesses, jeopardising their reputation and the confidentiality of sensitive information. How can corporate legal teams...
Watch On-Demand: Navigating Legal Landscapes in Digital Assets: Best Practices for Legal Professionals Legal practices related to digital assets require a unique approach compared to traditional assets. As the digital asset market rapidly expands, legal professionals...