Latest Posts › Cybersecurity

Share:

End-to-end encryption: obstacle or pillar of national security?

In the face of rising cybercrime, end-to-end encryption has become a point of tension between the protection of secrets, public security, and technological sovereignty. At stake: preserving encryption as a safeguard for...more

CNIL 2025-2028 strategic plan: AI, Minors, Mobile Apps & Cybersecurity

Anticipating enforcement priorities of regulators may partly rely on their long-term trajectory and domestic dynamics, which differ from a country to another. This action plan reflects CNIL’s ambition (i) to be appointed by...more

Measuring diversity at work: the CNIL finally opens a public consultation

On July 9, 2024, the CNIL launched a public consultation on a draft recommendation (“Draft Recommendation”) on measuring diversity in the workplace. While measuring diversity is an important indicator in the fight against...more

Bilan de l’activité contentieuse de la CNIL en 2023 : un rétroviseur pour lire l’avenir

Il n’y a pas de question plus difficile en matière contentieuse que celle de l’anticipation des risques de faire l’objet d’un contrôle ou d’une sanction. C’est la raison pour laquelle il est utile de se nourrir des évolutions...more

The reuse and transfer of data held by public sector bodies under the EU Data Governance Act

The Data Governance Act is meant to foster the creation of a single European market for data sharing and re-use to enhance its commercial and scientific potential. Data held by public sector bodies are likely to be of key...more

5 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide