Information Security

A large red apple sits next to a small red cherry on a white surface.

Why Data Processors Need Two Information Protection Policies

May 10, 2024
Posted in

This entry explains why data processors (in particular) should have two distinct complementary types of information protection policies: one outlining the information security practices related to the services they provide data controllers, and another covering how they protect the vital information used to run their business. All modern data protection regulations require data controllers (clients)…

Read More
A globe that is patterned with business-related photos is floating in an orbit and being hit with a sharp beam of light.

How AI Tools Could Compromise Intellectual Property Rights

March 1, 2024
Posted in

For close to 70 years, case law and regulatory enforcement have firmly established that in order to defend its intellectual property (IP) rights, an organization must demonstrate that it has appropriately protected the information from unauthorized and unnecessary access. In other words, courts and regulators decided long ago that they were not going to defend…

Read More