Search for:

Data Privacy


While Hong Kong has yet to enact specific legislation on cybercrime or cybersecurity, this will soon change with the announcement of the proposal to enact a new cybersecurity law during the Chief Executive’s 2021 Policy Address and the issuance of a consultation paper on “Cyber-dependent crimes and jurisdictional issues” by the Hong Kong Law Reform Commission.

The metaverse concept is going mainstream and is creating opportunities for companies to scale and diversify their businesses. In this episode of TMT Talk, Teresa Michaud, Ashlin Perumall, and Francis Donnat discuss what made metaverses into one of the biggest trending tech topics and what relevant legal aspects should businesses be aware of as they continue to evolve and become accessible to an audience beyond the gaming industry.

The speed and volume of change in the crypto asset markets has accelerated across the globe, with established financial institutions increasingly entering the sector whilst regulators look to keep pace. Recent high-profile developments and market volatility have led to growing calls for scrutiny and regulatory controls. Navigating this fast paced environment, within a sometimes disjointed regulatory framework, can be challenging.
This virtual seminar series will provide insights on how the regulatory landscape is changing and discuss the future of crypto within the financial services sector. Set out below are details of our 2022 series.

One of the main commitments assumed by Beatriz de Anchorena, current director of the Agency for Access to Public Information, was to initiate the process of updating Personal Data Protection Law No. 25,326, which was enacted in 2000. In this regard, meetings were held in August 2022 with public agencies, civil society organizations, universities and the private sector.

The Tax Administration Act in South Africa permits the warrantless search and seizure of a taxpayer’s property by the South African Revenue Service, which plays an essential role in ensuring that taxes are collected in an efficient and effective manner. However, this has been under scrutiny for many years due to its potential to infringe the right to privacy as enshrined in the South African Constitution. A recent case highlighted this matter and the circumstances under which such procedures may be carried out.

Cybersecurity threats and risks are increasing each day and companies are extremely cognizant of the critical issues involved – from making sure that company data complies with vigorous and ever-changing regulations, to dealing with cyber threats, breaches and ransomware attacks. In the Future of Disputes virtual program, former Manhattan District Attorney and Global Chair of Baker McKenzie’s Cybersecurity Practice, Cyrus Vance, Jr. led a discussion with Baker McKenzie practitioners in North America discussing the life cycle of a cyber-attack, including cyber insurance, privacy notification obligations, investigations, and post-event litigation.

The California Privacy Rights Act of 2020 (CPRA) amended the California Consumer Privacy Act of 2018 (CCPA) with most changes taking effect on 1 January 2023 with a twelve-month look-back. Limited exceptions concerning the personal data of employees and business contacts will expire. The new California Privacy Protection Agency (CPPA) has published draft regulations that will, once finalized, expand on the rules in the statute and existing regulations from the California Attorney General.

The National Privacy Commission issued Circular No. 2022-01 on 12 August 2022, entitled “Guidelines on Administrative Fines”. The Circular fixes the administrative fines to be imposed upon personal information controllers or personal information processors for infractions of the Data Privacy Act of 2012, its implementing rules and regulations, and the issuances of the NPC. The Circular takes effect on 27 August 2022 and will apply prospectively. Thus, complaints that have already been filed with the NPC prior to the effectivity date are not covered by the Circular.

In Canada, attempting to stop an employee from sharing confidential information, competing, or soliciting customers, suppliers or employees can be tricky. In this In Focus video, our Labor and Employment lawyers discuss the current state of the restrictive covenant landscape and what steps employers can take to protect their businesses.