
John M. Cassell
Articles
-
Dec 12, 2023 |
lexblog.com | Imran Ahmad |John M. Cassell |Suzie Suliman |Jeremie Wyatt
In our previous post, we discussed specific considerations for common boilerplate provisions in data processing agreements (DPAs). Due to the sensitivity of data transfers and privacy laws, DPAs require careful drafting to ensure the data processor complies with appropriate privacy obligations and is responsible for any non-compliance. This post takes a closer look at DPA-specific obligations relating to the data processing itself.
-
Dec 4, 2023 |
lexblog.com | Imran Ahmad |John M. Cassell |Suzie Suliman |Jeremie Wyatt
Modern businesses collect and process personal information about their customers and employees for the benefit of their business – these benefits include identifying opportunities to enhance their products or services, streamlining operations, reducing costs or maximizing profits. Processing such data is often outsourced to a third-party data processing service provider.
-
Nov 28, 2023 |
lexblog.com | Imran Ahmad |John M. Cassell |Maya Medeiros |Véronique Barry
In a world where generative AI is driving innovation and technology is outpacing legislation, there’s a lot for companies to consider to maintain operational effectiveness and minimize risk. To help provide some guidance, Norton Rose Fulbright Canada hosted its 2023 technology, privacy and cybersecurity virtual summit.
-
Apr 5, 2023 |
lexblog.com | Imran Ahmad |John M. Cassell
For the energy sector, cybersecurity has been a top-of-mind issue for some time. This is particularly true given some of the high-profile cyber-attacks seen in recent years that have grabbed not only media headlines but also resulted in operational disruption, financial losses and legal exposure. The challenge with cybersecurity is attacker tactics are constantly evolving thereby requiring organizations to be constantly vigilant and if possible, one step ahead of the attackers.
-
Feb 28, 2023 |
devprojournal.com | John M. Cassell
The last few decades have seen enormous, steady, and irreversible transformations in the interrelated realms of software development and cybersecurity. As regards the former, the perceived need for more flexible and versatile software development techniques culminated in the early days of the 21st century when the agile manifesto tipped top, signaling the turning away from linear and sequential methodologies as showcased by the waterfall model.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →