Worldwide, data protection laws are based on a straightforward principle: collect and process as little data as possible to ...
When it comes to cyber disruption and attacks, it’s not a matter of “if,” but “when.” Attackers increasingly target ...
This article is authored by Avimukt Dar, founding partner and Anushka Narayan, associate, CMS INDUSLAW.
Policies are critical in workplaces as they articulate an institution’s standpoint on an issue clearly delineating what is ...
How modern age-verification laws, like the California Digital Age Assurance Act, dismantle the principle of data minimization by mandating the collection of sensitive personal data, effectively ...
Israeli attacks on four oil depots around Tehran on March 7, 2026 may cause long-term health and environmental harm for ...
The deployment of cluster munitions in the vicinity of the 11th-century Preah Vihear temple marks a critical intersection of ...
It’s still self-surveillance with our tax dollars and everything else, but we are also creating nets of smart devices and ...
Clay Friedman and Jessica Birdsong of Troutman Pepper Locke LLP discuss what companies should look out for when they are the ...
Since the onset of what authorities described as “blatant Iranian attacks,” UAE air defences have intercepted 537 ballistic ...
As part of the reforms to AIPPA, the legislature considered and passed the Zimbabwe Media Commission (ZMC) Act, the Cyber and ...
A scientist, an engineer, an archaeologist and a lawyer break down some of the physical, environmental, ethical and legal ...