Yesterday, Virginia became the second state after California to pass a comprehensive privacy law when Governor Ralph Northam signed the Consumer Data Protection Act (CDPA). The CDPA contains many elements found in the California Consumer Privacy Act (CCPA) and other proposed privacy frameworks, as well as a number of new requirements for businesses. Please see […]
Uncategorized
The EDPB-EDPS Joint Opinion on Data Processing Standard Contractual Clauses: Key Takeaways
When a controller engages a processor, the GDPR requires that the parties enter into a specific contract that contains certain mandatory provisions. This contract is often referred to as a ‘data processing agreement’ or ‘DPA’. To facilitate compliance with this requirement, the GDPR has provided the European Commission with the power to issue standard contractual […]
Peter Swire Testifies on Future of Transatlantic Data Flows
Peter Swire, Senior Counsel, Alston & Bird, Elizabeth and Tommy Holder Chair of Law and Ethics, Georgia Tech Scheller College of Business, and Research Director, Cross-Border Data Forum, recently testified before the U.S. Senate Committee on Commerce, Science, & Transportation on the invalidation of the EU-U.S. Privacy Shield and the Future of Transatlantic Data Flows. […]
German DPA Publishes Schrems II Transfer Compliance Checklist and Suggested Modifications to SCCs
On August 24, 2020, the data protection authority of the German state of Baden-Württemberg (the “DPA”) published guidance (the “Guidance”) on international transfers of personal data following the Schrems II judgment (which we have previously covered here). This represents the first comprehensive guidance by a European privacy supervisor indicating how it intends to enforce the […]
Cyber Hygiene and Cyber Threats in the Age of COVID-19
The shift to remote work in response to the coronavirus (COVID-19) pandemic poses cybersecurity and information technology risks to companies, particularly due to an expanded work-from-home environment. In the midst of this environment, cybercriminals enjoy a target-rich world. We have also seen an explosion of cybercriminal activity taking advantage of the unique uncertainties of the […]