Remove 2021 Remove Data protection Remove Failure-to-appear
article thumbnail

European Data Protection Roundup – September

Debevoise Data Blog

million fine against Austrian Post for channelling electronic data protection-related inquiries to a web form and not offering an additional email address, irrespective of the data subject option to also use non-electronic postal mail or customer service. These developments, and more, covered below.

article thumbnail

European Data Protection Roundup: 2020 in Five Trends

Debevoise Data Blog

In this post, we look back at the 2020 European data protection landscape and five trends that help companies understand not only where we are, but where data protection enforcement, litigation, and practice may be headed. million against Marriott for its 2018 data breach When you dig deeper though, two key points emerge.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European Data Protection Roundup – October 2023

Debevoise Data Blog

Data protection & AI: In particular: (i) the French CNIL published its first set of guidance on GDPR compliance when developing AI tools; and (ii) the UK ICO issued a preliminary enforcement notice against Snap over its AI chatbot, alleging that Snap had not adequately assessed the privacy risks posed to child users of the tool.

article thumbnail

Why is data management important for lawyers?

Legodesk

Legal practice data management is the process of organizing, storing, and retrieving data related to legal cases. An effective legal practice data management system can help lawyers to work more efficiently and increase their win rate. In today’s digital time, law firms have access to more data than ever before.

Lawyer 52
article thumbnail

National Cybersecurity Strategy (Part 1): The White House Urges Private and Public Action

Debevoise Data Blog

In Part 1 of this Debevoise Data Blog series, we discuss the key provisions from pillars 1, 3 and 4, which mostly affect the private sector by calling for expanded cybersecurity standards, changes to market incentives through both carrots and sticks and efforts to secure certain Internet infrastructure.