Category

Information Governance

Category

The COVID-19 pandemic has forced many organizations to re-evaluate and transform their approach to crisis and risk management in relation to their information governance programs. Since the start of the pandemic, several jurisdictions have introduced temporary legislative measures (e.g., proof of vaccination requirements), amendments to existing legislation (e.g., tax relief measures), imposed new requirements (e.g., remote working), and suspended limitation periods for legal claims and disputes in certain situations. As with any crisis that triggers…

In the wake of recent public corporate scandals involving fraud and misconduct, regulators at a global level are increasing their oversight in the area of whistleblower protection as well as issuing substantial fines and penalties to public and private sector organizations for such misconduct. Several jurisdictions have implemented, recently updated, or are introducing whistleblowing laws and anti-retaliation measures in an effort to identify and combat fraud and misconduct across different sectors including financial, pharmaceuticals, and…

Why are Intellectual Property Rights Important? Organizations that are constantly innovating to create new products (or to improve existing products) will need to consider how they are protecting those newly created (or improved) assets. One of the ways that they can do so is by ensuring that they own the relevant intellectual property rights. Intellectual property (“IP”) refers to a set of intangible assets that, when owned by an organization, legally protect that organization’s creations…

Whether you want to call it “design thinking,” “human-centered design,” or “user experience design,” the approach, goals, and strategy are all very much the same. It is a way of putting the user at the centre of your design process every step of the way, to develop and deliver the best possible solution and experience. While user experience is often thought of through the lens of providing customers with products or services, there is no…

Executive Summary On 20 August 2021, the Standing Committee of the National People’s Congress passed the Personal Information Protection Law of the PRC (“PIPL”), after deliberating two draft versions and seeking for public comment in a ten month’s span. The passage of the PIPL signifies that China is stepping into a more robust and comprehensive personal information protection regime by establishing a unified, generally-applicable legislation, as EU does with the aid of the General Data…

IntroductionThe integration of high technology software and sophisticated systems in automobile design has produced cars that have become complex computers teeming with billions of data. Built-in sensors, Internet-connected dashboards, video content-sharing capabilities, and infotainment platforms have made these smart cars hyper-efficient data collecting machines. While this development presents exciting opportunities, it is critical to have a robust strategy to address the associated risks.1. Designed with Data Security in MindAutomakers will need to consider privacy and data…

Over the past few decades, supply chain management has benefited immensely from technological advances that have made it easier and faster to transport cargo from one place to another. However despite these advances, supply chains continue to face challenges when it comes to tracking cargo, ensuring the integrity of cargo and holding members of the supply chain accountable for cargo, as it moves from one participant in the chain to the next. Blockchain has the…