Companies and their counsel face an array of complex challenges as national and regional authorities increasingly seek to regulate the free flow of data across borders and assure protection of data from hacking (typically from foreign threats). High profile hacking incidents, such as the massive recent breach at Equifax, create more pressure on regulators and businesses. The European Union has notably taken the lead in regulating data flows in ways that affect countless American businesses and other are also adding data-related rules often modeled to some degree on the EU rules. The panel will discuss steps that corporations should take to anticipate, comply with, and respond to these new regulatory regimes.
At my invitation, Wiseman and Smith carried out 4 videotaped experiments with a dog called Jaytee, with whom I have carried out more than 100 videotaped experiments (Sheldrake, 1999b). My experiments showed that Jaytee usually waited by the window for a far higher proportion of the time when his owner was coming home than when she was not. This occurred even when his owner, Pam Smart, came at non-routine, randomly-selected times and travelled by unfamiliar vehicles such as taxis. This pattern was already clearly apparent months before Wiseman et al. carried out their tests.