The "Lesser-Included" Email Debate: What Does Rule 34 Really Require for Production?
We get Privacy for work — Episode 11: Beyond the Checkbox: Engaging Your Workforce in Privacy and Data Security Training
Dinsmore's Herb Stapleton Discusses Reducing Cybercrime Risk
Top Employment Insights: 44th Annual Workforce Management Briefing - #WorkforceWednesday® - Employment Law This Week®
Dinsmore's Herb Stapleton Appears at CNBC AI Summit
The Privacy Insider Podcast Episode 19: Where Tabletop Games Meet the Future of Privacy with Dr. Tehilla Shwartz Altschuler of the Israel Democracy Institute
We get Privacy for work — Episode 10: Employee Monitoring Tools: Too Good to be True?
We get Privacy for work — Episode 9: The Explosion in BIPA Litigation
Social Media and Employee Firings: What Employers Need to Know - #WorkforceWednesday® - Employment Law This Week®
5 Key Takeaways | The Law of the Machine (Learning): Solving Complex AI Challenges
The Privacy Insider Podcast Episode 18: From Craigslist to Philanthropy, It’s All About the Golden Rule with Craig Newmark
Podcast — EU Data Act: Spotlight on Switching Requirements for Data Processing Services
Podcast — EU Data Act: Implications for Data Privacy and Cybersecurity
AI in the Workplace: California Sets a New Compliance Standard - #WorkforceWednesday® - Employment Law This Week®
State AGs' Continued Focus on Enforcement – With or Without AI Legislation — Regulatory Oversight Podcast
State AGs' Continued Focus on Enforcement – With or Without AI Legislation — The Good Bot: Artificial Intelligence, Health Care, and the Law
The Business Associate Close Out Process
We get Privacy for work — Episode 8: The Surge in Data Breach Lawsuits: Trends and Tactics
No Password Required: From Heavy Metal to the Front Lines of Cyber Innovation
The Privacy Insider Podcast Episode 17: Security, Cyber-Intel, and a Sense of Humor with Nir Rothenberg of Rapyd
The digital age presents a complex challenge: protecting children online while also allowing free speech to continue to be a thriving marketplace of ideas. Originally published in Law360 - August 4, 2025....more
Ed. Note: This is the fifth article in our series, “Conjuring Competitive Advantage: An AI Spellbook for Leaders,” focused on unlocking AI for business with practical steps and insights. Read Part 1, Part 2, Part 3, and Part...more
In the wild new world of TCPA litigation following the end of binding deference to the Federal Communications Commission (FCC), one of the more salient questions is whether the Do-Not-Call (DNC) Registry’s protections extend...more
Department of Homeland Security (DHS) issued a final rule requiring all non-U.S. citizens to be photographed (biometrics) upon U.S. entry and exit. This includes U.S. lawful permanent residents and previously exempt...more
Join us for an insightful discussion on data breach management featuring industry experts: - Harry Buck | Founder and CEO of Legal Outsourcing 2.0, Inc. Harry is an experienced litigator, and the Founder and CEO of Legal...more
The Joint Commission and the Coalition for Health AI released non‑binding guidance outlining principles for the responsible use of AI in healthcare including governance, privacy and transparency, data security, safety event...more
As our readers are aware, California Invasion of Privacy Act (“CIPA”) lawsuits have recently dominated headlines in the California consumer privacy space. Most, if not all, of these lawsuits involve defendants that operate...more
On May 16, 2024, the Securities and Exchange Commission (“SEC”) adopted amendments (the “Amendments”) to modernize Regulation S-P (“Reg S-P”). The Amendments include substantially expanded requirements for safeguarding...more
In her remarks at this year’s ANA Masters of Advertising Law Conference, Commissioner Melissa Holyoak of the Federal Trade Commission (FTC) emphasized three areas where the agency is focusing its consumer protection...more
In this episode of LathamTECH in Focus, Frankfurt partner Tim Wybitul outlines what businesses need to know about the EU Data Act, including key risks and potential new opportunities....more
New rules under the California Consumer Privacy Act will have a huge impact on the world of data privacy and artificial intelligence. These rules focus on three major areas: cybersecurity audits, risk assessments, and...more
The RIA Compliance and Legal Strategies Conference is back at our offices in Hamilton, NJ. The Conference is an essential event for RIAs and IARs to gain a valuable understanding of current regulatory and compliance-related...more
As artificial intelligence (AI) technologies increasingly integrate into legal practice, contract drafting has become a prominent area of innovation. AI models promise enhanced efficiency, consistency, and cost-savings, but...more
The Belgian Data Protection Authority recently ruled on a complaint after an employer shared a full court judgment with all its staff, revealing the personal data of employees and trade unions involved in the case. Below we...more
As European data and artificial intelligence (AI) regulations increasingly reach across borders, American companies find themselves ensnared in a web of foreign compliance obligations, which raises questions about sovereignty...more
The increasing use of AI-enabled meeting tools means that organizations are no longer dealing with a single minutes document, but a complex ecosystem of recordings, machine transcripts, AI summaries, decks and conventional...more
The US Department of Justice, along with several state attorneys general, has issued subpoenas and civil investigative demands to hospitals, physicians, telehealth companies, and pharmaceutical manufacturers engaged in...more
AI tools are now a valuable part of the day-to-day toolkit for many teams. The rewards can be great. They can summarise long documents, generate drafts, and organise data fast. However, putting confidential information into...more
In June 2025, the US Food and Drug Administration (FDA) issued a final guidance titled Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket Submissions (2025 Cybersecurity Guidance). This...more
On 1 October 2025, the General Court of the European Union (GCEU) held the EU liable for non‑material damage caused by the unlawful processing of personal data by an EU body. In OC v. Commission (T ‑384/20 RENV),1 which...more
Asia’s digital environment—particularly China’s mobile-first business culture and evolving regulatory landscape—is necessitating global companies to rethink Bring Your Own Device (BYOD) programs. Traditional “one device fits...more
Our Health Care and Privacy, Cyber & Data Strategy groups review the status of the proposed update to the HIPAA Security Rule....more
The legal landscape for digital compliance in Texas has shifted dramatically in recent months, as legislators have advanced a series of sweeping requirements for age verification and consumer protection online. These new laws...more
Vendor contract management plays a critical role in controlling operational risk across the enterprise. When managed effectively, contracts shape how your organization protects data, enforces compliance, and holds vendors...more
Data breach class actions inevitably follow from nearly every major security incident. Here are seven things in-house counsel can do to prepare for litigation. 1. Create a Strong Foundation - Depending on the nature and scope...more