141 results
Advanced search
Data Privacy
AI
1-24
/Total: 141 results

Article etc.
"Key Practical Points in Information Management, in the Form of Dialogue (5): Digital, Data, and AI-related Legislative Trends in the EU (2) - General Introduction (2) Detailed Discussion (1)"
Publication:Kaishahoumu A2Z February 2025

Article etc.
"Explaining the Outline of the EU AI Act and Necessary Measures to be Taken by Japanese Companies - With Q&A of Frequently Asked Questions"
Publication:BUSINESS LAWYERS

Article etc.
"Series: Technology x Copyright - Keywords for Promoting a Better Understanding (10): RAG (Retrieval Augmented Generation)"
Publication:Copyright No.765 Vol.64

Article etc.
"Forthcoming Enforcement of the Security Clearance Law: What Measures Should Companies Develop?"
Publication:PC-Webzine

Article etc.
"How Japan Should Respond to the EU Cyber Resillience Act"
Publication:Nikkei Robotics January 2025

Article etc.
"Key Practical Points in Information Management, in the Form of Dialogue (4): Digital, Data, and AI-related Legislative Trends in the EU (1) - General Introduction (1)"
Publication:Kaishahoumu A2Z December 2024

Article etc.
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (5) Unauthorized Account Log-ins"
Publication:Business Houmu Vol.25 No.1

Article etc.
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (4) Phishing Scams and Unlawful Cash Transfers"
Publication:Business Houmu Vol.25 No.1

Article etc.
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (3) Information Divulgence by Internal Wrongdoing"
Publication:Business Houmu Vol.25 No.1

Article etc.
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (2) Information Divulgence by Contractors”
Publication:Business Houmu Vol.25 No.1

Article etc.
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (1) Ransomware Attacks”
Publication:Business Houmu Vol.25 No.1

Article etc.
"Series: Technology x Copyright - Keywords for Promoting a Better Understanding (8): AI-Related Regulations in the State of California (1): Digital Replicas"
Publication:Copyright No.763 Vol.64

Article etc.
"Special Feature: AI and Law -Risks and Outlook in the Era of Generative AI Part 2 [Papers] Current and Future Status of AI Law and Policies of the Japanese Government"
Publication:Rule of Law No.215

Article etc.
"Key Issues Concerning the Handling of Children's Personal Information"
Publication:NBL No.1276

Article etc.
"About the 'Act on the Protection of Personal Information - Interim Report for the Review on the so-called Triennial Revision'"
Publication:Accounting & Auditing Journal Vol.36 No.11

Article etc.
"Series: Technology x Copyright - Keywords for Promoting a Better Understanding (7): Fine-tuning"
Publication:Copyright No.762 Vol.64

Article etc.
"AI Guidelines for Business Ver 1.0 (1st ed.)"
Publication:NBL Additional Volume No.190