
James Koenig
Articles
-
1 month ago |
regulatoryoversight.com | Peter Jeydel |James Koenig |David Navetta |Laura Hamady
What's Happening? Under the Department of Justice's (DOJ) "Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countries of
-
Oct 1, 2024 |
lexology.com | Mindy McGrath |Andy Flavin |James Koenig |Brandon Woods |Laura Hamady |Keith Barnett | +4 more
Charging Ahead: Legal, Regulatory, and Operational Considerations for EV Infrastructure Developmenttroutman.com Table of ContentsIntroduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 The Stakeholders. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 How it Works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
-
Sep 16, 2024 |
lexology.com | James Koenig |Laura Hamady |Joel Lutz |Tracey E. Diamond |Alison Grounds |Kim Phan | +2 more
Using AI in HR - Hire or Hover? Hiring executives are asking if the compliance costs and discrimination risks outweigh the anticipated benefits of using artificial intelligence (AI) tools for hiring and employment-related activities. Troutman Pepper has been monitoring this rapidly evolving issue, including current and anticipated legal requirements as well as the emerging best practices companies are implementing.
-
Jul 15, 2024 |
jdsupra.com | David Anthony |Laura Hamady |James Koenig
On July 5, the California Privacy Protection Agency (CPPA) published a Notice of Proposed Rulemaking regarding Data Broker Registration pursuant to Senate Bill 362 (the Delete Act). The Delete Act requires the CPPA to establish an accessible deletion mechanism. This mechanism allows a consumer, through a single verifiable consumer request, to request that every data broker delete any personal information related to that consumer held by the data broker or associated service provider or contractor.
-
May 10, 2024 |
jdsupra.com | Brent Hoard |James Koenig
This article was originally published in the ACG Middle Market DealMaker Magazine | Spring 2024 issue on May 6, 2024 and is republished here with permission. Historically, many private equity firms have let their portfolio companies independently manage cybersecurity. Given the increase in data and cyber risks, sophistication of threat actors, and impact and cost of breaches, leading PE firms are taking a new collaborative approach.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →