Ask Me Anything - Finding answers to your questions
When you have a question, who do you ask, a co-worker, a friend? Do you do a trusty Google (internet search)? While those avenues may provide some information, wouldn't it be great to ask an expert?
For our inaugural Ask Me Anything: The Expert Series, we are excited to bring together a group of experts from Thompson Dorfman Sweatman LLP (TDS) to answer your questions related to cybersecurity, intellectual property, data protection and more.
Each member of our panel has their own specialty. Check out our experts bios below and submit your questions during registration!
Silvia De Sousa
Silvia's practice is concentrated in the area of business law with an emphasis on intellectual property law and technology law. Her practice also includes intellectual property transactions, cannabis advertising and marketing, intellectual property protection, trademarks, copyrights, patents and licensing matters. Silvia is a trademark agent.
Cathy is a lawyer at Thompson Dorfman Sweatman and is a founding member of the firm's Privacy and Data Protection Practice Group. Cathy provides advice to clients in the public, private and non-profit sectors on regulatory compliance with provincial, federal, and international privacy laws, risk minimization and management strategies, cross-border data flow issues, creation and implementation of privacy and data protection policies, procedures, and data breach prevention and response.
Doug practices primarily in the areas of Privacy and Data Protection, Cyber Security, Technology, Property and Development and Corporate and Commercial law. He is a founding member of Thompson Dorfman Sweatman LLP's Privacy and Data Protection Practice Group. Doug advises clients on privacy, data protection and cyber-security matters, including legal obligations, compliance with provincial, federal and international privacy laws, risk minimization and management strategies, creation and implementation of privacy, data protection and cybersecurity policies, procedures and practices, data breach reporting and notification matters, incidence response planning, external vendor/service provider risk mitigation, including contract review, and cyber insurance, including policy review.