Ë

In the past decade, Salesforce Marketing Cloud has become one of the most recognizable names in Customer Relationship Management and digital marketing automation.

Read More

There are many important factors to consider when choosing a cloud provider for your cloud use cases. For organizations in heavily regulated industries, compliance with relevant regulations is one of the most important things to think about. Whether you’re planning for a single cloud workload or a hybrid multi-cloud setup, maintaining compliance for sensitive data in the cloud is imperative.

Read More

Follow our 9 part blog series on Understanding Canadian Cybersecurity Law. In Article 3, Melissa Lukings and Arash Habibi Lashkari focus on cyber security-specific legislation and cybercrime-specific Criminal Code provisions under our existing Canadian federal law.

Read More

Follow our 9 part blog series on Understanding Canadian Cybersecurity Law. In Article 7, Melissa Lukings and Arash Habibi Lashkari discuss the legal issues relating to encrypted online criminal activities, specifically those involving or facilitated by the use of Dark Web browsers and cryptocurrencies (such as TOR and Bitcoin, respectively) which provide anonymity to both parties in an illegal transaction.

Read More

Follow our 9 part blog series on Understanding Canadian Cybersecurity Law. In Article 6, Melissa Lukings and Arash Habibi Lashkari highlight the common law tort of intrusion upon seclusion and the relatively new criminal offences of cyberbullying and the sharing of intimate images.

Read More

Follow our 9 part blog series on Understanding Canadian Cybersecurity Law. In Article 5, Melissa Lukings and Arash Habibi Lashkari focus on Canada’s Anti-Spam Legislation (CASL), the federal law dealing with spam and other electronic threats.

Read More

Follow our 9 part blog series on Understanding Canadian Cybersecurity Law. In Article 4, Melissa Lukings and Arash Habibi Lashkari venture into the realm of Canadian cybersecurity laws related to interpersonal privacy, data breaches, network attacks, and other computer-related activities of a criminally malicious nature.

Read More

Follow our 9 part blog series on Understanding Canadian Cybersecurity Law. In Article 3, Melissa Lukings and Arash Habibi Lashkari focus on the laws regulating private sector access to, use of, and disclosure of personal information as established in the PIPEDA.

Read More

Follow our 9 part blog series on Understanding Canadian Cybersecurity Law. In Article 2, Melissa Lukings and Arash Habibi Lashkary detail, the collective national journey into the realm of cybersecurity law begins with these two acts, which set a basis for future governmental legislation regarding privacy and data access in Canada.

Read More

Follow our 9 part blog series on Understanding Canadian Cybersecurity Law. In Article 1, Melissa Lukings and Arash Habibi Lashkary start with the foundations by framing the legal landscape, determining what is private information and regulating relationships.

Read More