When AI Meets PI: Assessing and Governing AI from a Privacy Perspective
The American Privacy Right Act (APRA) explained
Navigating the Regulation Jungle: How to Be Compliant, Work Efficiently, and Stay Sane
Healthcare Document Retention
Legal Alert | Wiretap Laws in the United States
Business Better Podcast Episode: Cyber Adviser – A Comparison of AI Regulatory Frameworks
Cost of Noncompliance: More Than Just Fines
Will the U.S. Have a GDPR? With Rachael Ormiston of Osano
No Password Required: MITRE Engage Lead, Innovator in Cyber Deception, and Dance Community Builder
Navigating State Privacy Laws: A Conversation with Oregon & Texas Regulators about Privacy Enforcement
The Team Continues to Grow: A Conversation With Our Newest Colleague, Kaitlin Clemens — Unauthorized Access Podcast
Episode 326 -- Dottie Schindlinger on Diligent's Report on Board Oversight of Cybersecurity Risks and Performance
[Webinar] Midyear Data Privacy Check-in: Trends & Key Updates
Information Security and ISO 27001
Decoding Privacy Laws: Insights for Small to Mid-Sized Businesses — Regulatory Oversight Podcast
No Password Required: Education Lead at Semgrep and Former Czar for Canada’s Election Security
Navigating State Privacy Laws
[Webinar] You Are Here: First Steps in Data Mapping
Data Centers: Demand, Development, and Future Challenges With Ali Greenwood — TAG Infrastructure Talks Podcast
AGG Talks: Women in Tech Law - Episode 1: Charting the Course: Women Trailblazing in Cybersecurity and Crisis Governance
This is the second article in our two-part series on Cybersecurity in the Age of Industry 4.0, focusing on the legal implications and potential liabilities manufacturers face from cyberattacks, as well as practical...more
Multi-jurisdictional civil fraud matters often present multiple challenges that make the tracing and recovery of assets a complex, costly, and time-consuming investigative process. Making a fraud victim whole again requires...more
Is theft of trade secrets a crime in Arkansas? Yes. Under Arkansas Code Annotated Section 5-36-107, the Arkansas Penal Code establishes that theft of trade secrets is a Class A misdemeanor. The statute establishes that a...more
It is often said that the best defense is a good offense. That is certainly true if you are an employer conducting a risk assessment of potential employee defections that could expose your company to losses of valuable...more
In this hot labor market, businesses have been laser focused on hiring and retaining talent. While increased employee mobility leads to some exciting hires, it also means some workers are leaving for new opportunities. When...more
Presented below is our summary of significant Internal Revenue Service (IRS) guidance and relevant tax matters for the week of November 29, 2021 – December 3, 2021... November 29, 2021: The IRS published a news release...more
Federal authorities have recently described the threat of economic espionage from foreign entities as one of the greatest threats to the economic vitality of the United States, and this has led to an increase in...more
Attorneys are well aware of the ways in which corporate clients are increasingly conducting their business and affairs electronically. A business may routinely place orders with trusted vendors via e-mail, rely on the...more
Below please find this week’s OTA & Travel Distribution Update for the week ending April 7, 2017. The recently released European Commission’s report on the hotel industry headlines this week’s Update. - European...more
In 2014, grocers and restaurants continued to be plagued by attacks leading to the theft of credit card information. Among others, Supervalu Inc. and Jimmy John’s both experienced intrusions in 2014, extending the string of...more
Many of us have been focused on cyber-security, especially in the wake of the recent data breaches over the holidays, among other things. Two Maryland Law Enforcement Officers are leveraging the power of social media and the...more
As in-house counsel, how would you like to tell your CEO: “While our customer lists, pricing information, and business processes are trade secrets, we can’t sue the independent contractor who stole them because we did not do...more
A Massachusetts dermatology practice, Adult & Pediatric Dermatology, P.C. ("APDerm") recently agreed to pay $150,000 to settle potential violations of HIPAA Privacy, Security, and Breach Notification Rules. The settlement was...more
In today’s complex global economy, competition is fierce. For many businesses, trade secrets are their single most important and valuable asset, and strong protection of that asset is paramount. In the same regard, trade...more
On April 3, 2013, the New York Times published an article about commercial databases that contain reports from retail employers about employees who were accused of stealing from their workplaces. Other retailers, for a fee,...more
On February 20, 2013, the White House issued a report outlining a new plan to combat trade secret theft from U.S. businesses. Faced with the escalating theft of U.S. trade secrets and noting “the crucial role of trade...more