TDW Tech Talk
Data Breach Response: The role of the incident response team
There is no “i” in “team,” but there is I.T. in the incident response team to a data breach. In this article, Pádraig Walsh from the Privacy and Cybersecurity practice group of Tanner De Witt looks at the key people involved in the incident response…Read More
Data Breach Response: The management response
A data breach can be a crisis, and crisis management is a true test of character and leadership. In this article, Pádraig Walsh from the Privacy and Cybersecurity practice group of Tanner De Witt looks at how executive management should approach and respond to a…Read More
Data Breach Response: The notification
If a tree falls in the woods, but no-one sees or hears it, did it ever really happen? Tough question. Here’s another one. If a data breach occurs, but the data subject does not know of it, did it ever really happen? Data breach notification…Read More
Data Breach Response: The first 24 hours
A data breach can be a crisis, but if you have a plan for the first 24 hour response, you can avoid making a drama out of a crisis. In this article, Pádraig Walsh from the Privacy and Cybersecurity practice group of Tanner De Witt…Read More
Data Breach Response: The importance of training
In a crisis, you don’t rise to the level of your aspiration, you fall to the level of your training. In this article, Pádraig Walsh from the Privacy and Cybersecurity practice group of Tanner De Witt explains why training before a data breach occurs is…Read More
Change is not coming: Further possible improvements to privacy protection in Hong Kong
Almost a year ago, the Constitutional and Mainland Affairs Bureau, in collaboration with the Privacy Commissioner of Hong Kong, provided its report on recommended changes to personal data privacy law in Hong Kong. There were six key proposals, but also some omissions. In the final…Read More
Data Breach Response: The importance of information security certifications
In every corner of the business world, people measure performance to benchmarks and standards. Information security is no different. In this article, Pádraig Walsh from the Privacy and Cybersecurity practice group of Tanner De Witt explains why certification for recognised information security standards supports an…Read More
Data Breach Response: The importance of an incident response plan
Mike Tyson once said that everyone has a plan until they get hit. Plans are still important. Without a plan, you have worse problems. With a plan, you have a better chance to pick yourself up, dust yourself down, and get back in the race….Read More
Change is coming: Administrative fining powers of the Privacy Commissioner
On 20 January 2020, the Constitutional and Mainland Affairs Bureau, in collaboration with the Privacy Commissioner of Hong Kong, provided its report on recommended changes to personal data privacy law in Hong Kong. In another in his series looking at the implications of the proposed…Read More
Change is coming: Proposed Mandatory Data Breach Notice Requirements in Hong Kong
On 20 January 2020, the Constitutional and Mainland Affairs Bureau, in collaboration with the Privacy Commissioner of Hong Kong, provided its report on recommended changes to personal data privacy law in Hong Kong. In another in his series looking at the implications of the proposed…Read More
Future Equity Agreements for Founders
Future Equity Agreements are succinct agreements that are relatively economical to enable startups to raise funds in a simple fashion when they require it. Tara Chan from the Corporate and Commercial practice group of Tanner De Witt summarises and assesses future equity agreements for founders….Read More
Key project team members for a Security Token Offering
Security token offerings (“STO”) are a next-generation financing model that combine the benefits of blockchain technology with traditional fund raising. As with any fundraising exercise, conducting an STO can be stressful. The stress is increased as the novelty of STOs makes the process more opaque. …Read More