Ed. Note: This is the fifth article in our series, “Conjuring Competitive Advantage: An AI Spellbook for Leaders,” focused on unlocking AI for business with practical steps and insights. Read Part 1, Part 2, Part 3, and Part...more
The intersection of AI capabilities with business ethics creates complex dilemmas requiring thoughtful navigation. Beyond traditional concerns about data privacy and security, AI raises fundamental questions about fairness,...more
Too many businesses approach AI implementation haphazardly, leading to failed pilots, wasted resources, and organizational skepticism. Treat AI adoption as a carefully managed project with clear goals, defined scope,...more
Many companies discover they have dozens of AI initiatives running independently across departments, often without coordination or oversight. Conduct a comprehensive audit of existing AI tools and practices across the...more
Businesses have long leveraged AI capabilities to organize massive document repositories, identify complex patterns in data, and automate manual tasks such as approvals, scheduling, and workflow management. The technology has...more
Companies have built business models around identifying and pursuing copyright infringement claims at scale. Understanding how these operations work—and how to respond appropriately—can save your business significant time,...more
Maybe you've noticed unusual patterns in lost business, or perhaps another employee tipped you off about the theft. Whatever the warning signs, you need to act quickly and strategically. Here's your step-by-step guide to...more
As part of Data Privacy Awareness Week, Ward and Smith is spotlighting the most common types of data breaches that businesses encounter. In Part 1, we explored the industries most vulnerable to cyberattacks, highlighting the...more
2/3/2025
/ Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Employee Training ,
Incident Response Plans ,
Phishing Scams ,
Ransomware ,
Risk Management ,
Social Engineering ,
Third-Party Service Provider
The FBI's Internet Crime Complaint Center (IC3) report sheds light on the growing threat of cybercrime, both nationally and within North Carolina. The state ranks among the top 15 in the U.S. for cybercrime complaints,...more
In today's digital landscape, the exchange of personal information has become ubiquitous, often without consumers fully comprehending the extent of its implications. The recent actions undertaken by the Federal Trade...more
At the recent In-House Counsel Seminar, three Ward and Smith attorneys presented a realistic role play response to an incidence of wire fraud, addressing red flags associated with fraudulent communications, corporate incident...more
4/3/2024
/ Breach Notification Rule ,
Cyber Insurance ,
Cybersecurity ,
Data Breach ,
Documentation ,
FBI ,
Fraud ,
Hackers ,
Incident Response Plans ,
Malware ,
Phishing Scams ,
Wire Fraud
As the relentless march of technology continues, scams have evolved into cunning traps, presenting a challenge to individuals of all ages.
Among the great tapestry of age groups, despite the wealth of experience and...more
12/8/2023
/ Best Practices ,
Cybersecurity ,
Data Protection ,
Data Security ,
Enhanced Cybersecurity Services ,
Information Security ,
Internet ,
Mobile Devices ,
Passwords ,
Phishing Scams ,
Scams
Earlier this year, the North Carolina High School Athletic Association (NCHSAA) approved a proposal to adopt a policy allowing name, image, and likeness (NIL) deals for high school student-athletes....more
As the Artificial Intelligence (AI) hype continues, you may feel a sense of déjà vu.
But after attending the recent Corporate Legal Operations Consortium (CLOC) conference—which was dominated by sessions on ways that AI...more
The ongoing massive data breach in the world of advertising: real time bidding ("RTB").
You likely are, or have been, a target of RTB without your knowledge. The Irish Council for Civil Liberties ("ICCL") found that the...more
We live in an age where our digital footprint is forever preserved. Even before you think twice about it, your data has been collected and saved.
In fact, in 2020, it was estimated that nearly 2MB of data was generated...more
Data is king in today's digital economy. The estimated net worth of this global data market is forecast to hit nearly $235 billion by 2026, meaning collecting and sharing personal information is big business. ...more
A Ward and Smith attorney, Information Technology professional and Privacy Officer outlined a variety of best practices and tips for businesses dealing with data security and privacy issues.
The webinar, one in a series...more
Privacy and Data Security is the body of law that addresses how an organization can collect, handle, and use personally identifiable information and how that information needs to be protected.
Community Associations quite...more
A recent statistic posted by Sweor states that 75% of consumers admit to making judgments on a company’s credibility based on the company’s website design.
During COVID, many companies were forced to digitize their entire...more
Friday afternoon, news sources reported that Molson Coors Beverage Company notified the Securities and Exchange Commission about an ongoing data breach that had delayed and disrupted, "the Company's business, including its...more
Friday afternoon, reports surfaced that a foreign nation had compromised newly-discovered flaws in the Microsoft Exchange Server email software and breached the cybersecurity efforts of more than 60,000 known...more
The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the U.S. Department of Health and Human Services (HHS) are aware of an increased cybersecurity threat to hospitals...more
While much about COVID-19 and its long-term impact on businesses and the economy is unknown, its effect of a worldwide increase in a reliance on digital means to engage in business transactions is undeniable and unlikely to...more
On January 31, 2020, the United Kingdom (UK) withdrew from the European Union (EU).
From February 1, 2020, to December 31, 2020, the UK and EU are in a "Transition Period," where there will be no change to the process of...more