Latest Publications

Share:

Trick or Treat Contracts: Avoiding AI Vendor Horror Stories

Ed. Note: This is the fifth article in our series, “Conjuring Competitive Advantage: An AI Spellbook for Leaders,” focused on unlocking AI for business with practical steps and insights. Read Part 1, Part 2, Part 3, and Part...more

The Ethics Cauldron: Brewing Responsible AI Without Getting Burned

The intersection of AI capabilities with business ethics creates complex dilemmas requiring thoughtful navigation. Beyond traditional concerns about data privacy and security, AI raises fundamental questions about fairness,...more

From Pumpkin to Pie: Transforming Raw AI Potential into Results

Too many businesses approach AI implementation haphazardly, leading to failed pilots, wasted resources, and organizational skepticism. Treat AI adoption as a carefully managed project with clear goals, defined scope,...more

Building AI Guardrails: Keeping the Ghosts of Bad Governance at Bay

Many companies discover they have dozens of AI initiatives running independently across departments, often without coordination or oversight. Conduct a comprehensive audit of existing AI tools and practices across the...more

Exorcising AI Myths: What's Really Haunting Your Business - Part 1

Businesses have long leveraged AI capabilities to organize massive document repositories, identify complex patterns in data, and automate manual tasks such as approvals, scheduling, and workflow management. The technology has...more

Crossing the Bridge: Copyright Trolls

Companies have built business models around identifying and pursuing copyright infringement claims at scale. Understanding how these operations work—and how to respond appropriately—can save your business significant time,...more

What to Do When Someone Steals Your Trade Secrets: A North Carolina Business Owner's Action Plan

Maybe you've noticed unusual patterns in lost business, or perhaps another employee tipped you off about the theft. Whatever the warning signs, you need to act quickly and strategically. Here's your step-by-step guide to...more

Data Privacy Insights Part 2: The Most Common Types of Data Breaches Businesses Face

As part of Data Privacy Awareness Week, Ward and Smith is spotlighting the most common types of data breaches that businesses encounter. In Part 1, we explored the industries most vulnerable to cyberattacks, highlighting the...more

Data Privacy Insights Part 1: North Carolina Ranks High in Cybercrime Complaints

The FBI's Internet Crime Complaint Center (IC3) report sheds light on the growing threat of cybercrime, both nationally and within North Carolina. The state ranks among the top 15 in the U.S. for cybercrime complaints,...more

FTC: Three Enforcement Actions and a Ruling

In today's digital landscape, the exchange of personal information has become ubiquitous, often without consumers fully comprehending the extent of its implications. The recent actions undertaken by the Federal Trade...more

Wire-Fraud, Data Breach, and Phishing: A Live Action Role Play for In House Counsel

At the recent In-House Counsel Seminar, three Ward and Smith attorneys presented a realistic role play response to an incidence of wire fraud, addressing red flags associated with fraudulent communications, corporate incident...more

Senior Savvy: Wise Owls Navigating Cyber Scams

As the relentless march of technology continues, scams have evolved into cunning traps, presenting a challenge to individuals of all ages. Among the great tapestry of age groups, despite the wealth of experience and...more

Whistle Blown: Time Out on North Carolina Student Athlete NIL Deals

Earlier this year, the North Carolina High School Athletic Association (NCHSAA) approved a proposal to adopt a policy allowing name, image, and likeness (NIL) deals for high school student-athletes....more

AI: Legal Déjà Vu or Revolution?

As the Artificial Intelligence (AI) hype continues, you may feel a sense of déjà vu. But after attending the recent Corporate Legal Operations Consortium (CLOC) conference—which was dominated by sessions on ways that AI...more

Going Once, Going Twice, Sold: Real Time Bidding Data Privacy Breach

The ongoing massive data breach in the world of advertising: real time bidding ("RTB"). You likely are, or have been, a target of RTB without your knowledge. The Irish Council for Civil Liberties ("ICCL") found that the...more

Data Privacy Part 2: You're Sharing Too Much

We live in an age where our digital footprint is forever preserved. Even before you think twice about it, your data has been collected and saved.  In fact, in 2020, it was estimated that nearly 2MB of data was generated...more

Data Privacy Part 1: The New Currency Businesses Should Protect and Here's How

Data is king in today's digital economy. The estimated net worth of this global data market is forecast to hit nearly $235 billion by 2026, meaning collecting and sharing personal information is big business. ...more

Upside Down: Privacy and Data Security LARP

A Ward and Smith attorney, Information Technology professional and Privacy Officer outlined a variety of best practices and tips for businesses dealing with data security and privacy issues. The webinar, one in a series...more

Privacy and Data Security for HOAs: What Your Community Association Needs to Know

Privacy and Data Security is the body of law that addresses how an organization can collect, handle, and use personally identifiable information and how that information needs to be protected. Community Associations quite...more

Website Compliance: Key Costly Legal Risks Every Business Should Consider

A recent statistic posted by Sweor states that 75% of consumers admit to making judgments on a company’s credibility based on the company’s website design. During COVID, many companies were forced to digitize their entire...more

Brews, Booze, and Data Breaches

Friday afternoon, news sources reported that Molson Coors Beverage Company notified the Securities and Exchange Commission about an ongoing data breach that had delayed and disrupted, "the Company's business, including its...more

Thousands Hacked: New Cyber-Attacks Affect Organizations Big and Small

Friday afternoon, reports surfaced that a foreign nation had compromised newly-discovered flaws in the Microsoft Exchange Server email software and breached the cybersecurity efforts of more than 60,000 known...more

Increased Threat of Cybercrime in Health Care Industry

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the U.S. Department of Health and Human Services (HHS) are aware of an increased cybersecurity threat to hospitals...more

COVID Quarantine + Surge in eCommerce = … ADA Discrimination Claims?!

While much about COVID-19 and its long-term impact on businesses and the economy is unknown, its effect of a worldwide increase in a reliance on digital means to engage in business transactions is undeniable and unlikely to...more

Brexit, Schmexit: How Resilient is Your Trademark Portfolio and Enforcement Strategy?

On January 31, 2020, the United Kingdom (UK) withdrew from the European Union (EU). From February 1, 2020, to December 31, 2020, the UK and EU are in a "Transition Period," where there will be no change to the process of...more

36 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide