LathamTECH in Focus: The EU Data Act: A Digital Game-Changer
The "Lesser-Included" Email Debate: What Does Rule 34 Really Require for Production?
We get Privacy for work — Episode 11: Beyond the Checkbox: Engaging Your Workforce in Privacy and Data Security Training
Dinsmore's Herb Stapleton Discusses Reducing Cybercrime Risk
Top Employment Insights: 44th Annual Workforce Management Briefing - #WorkforceWednesday® - Employment Law This Week®
Dinsmore's Herb Stapleton Appears at CNBC AI Summit
The Privacy Insider Podcast Episode 19: Where Tabletop Games Meet the Future of Privacy with Dr. Tehilla Shwartz Altschuler of the Israel Democracy Institute
We get Privacy for work — Episode 10: Employee Monitoring Tools: Too Good to be True?
We get Privacy for work — Episode 9: The Explosion in BIPA Litigation
Social Media and Employee Firings: What Employers Need to Know - #WorkforceWednesday® - Employment Law This Week®
5 Key Takeaways | The Law of the Machine (Learning): Solving Complex AI Challenges
The Privacy Insider Podcast Episode 18: From Craigslist to Philanthropy, It’s All About the Golden Rule with Craig Newmark
Podcast — EU Data Act: Spotlight on Switching Requirements for Data Processing Services
Podcast — EU Data Act: Implications for Data Privacy and Cybersecurity
AI in the Workplace: California Sets a New Compliance Standard - #WorkforceWednesday® - Employment Law This Week®
State AGs' Continued Focus on Enforcement – With or Without AI Legislation — Regulatory Oversight Podcast
State AGs' Continued Focus on Enforcement – With or Without AI Legislation — The Good Bot: Artificial Intelligence, Health Care, and the Law
The Business Associate Close Out Process
We get Privacy for work — Episode 8: The Surge in Data Breach Lawsuits: Trends and Tactics
No Password Required: From Heavy Metal to the Front Lines of Cyber Innovation
In a landscape where the average cost of a data breach reached an all-time high of $4.88 million in 2024 — a 10% increase over the previous year — data protection assessments (DPAs) serve as a preemptive tool to identify...more
In today’s landscape of evolving cyber threats, assuming your business is safe is no longer an option – it’s time to take proactive steps to defend against cyberattacks. In the arms race between cyberattacks and organizations...more
Recently, the National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), and Canadian Centre for Cyber Security...more
Covered Entities should expect heightened supervisory focus on relationships where third party service providers (TPSPs) access systems or handle non-public information (NPI). On October 21, the New York State Department of...more
On October 29, the U.S. District Court for the Eastern District of Kentucky granted a preliminary injunction prohibiting the Consumer Financial Protection Bureau from enforcing its Personal Financial Data Rights Rule, also...more
A new report from Anthropic, a leading Artificial Intelligence (AI) company, highlights a troubling development in the cybersecurity landscape: threat actors are now using AI to automate nearly every step of a cyber extortion...more
As artificial intelligence (AI) becomes increasingly embedded in processes and systems across healthcare organizations, clinicians and administrators face an intensifying challenge to adapt their organizations to the rapidly...more
Want to learn more about drafting, negotiating, and understanding intellectual property and technology contracts and have 10 minutes to spare? Grab your morning coffee or afternoon tea and dig into our Tech Contract Quick...more
Cybersecurity and data privacy matters impact everything around us, including our physical space. Commercial real estate space represents a large part of every city across the globe, whether it is owned or leased. What would...more
Welcome to your monthly legal insights on the trends impacting the Retail, Hospitality, and Food & Beverage Industries....more
A new bipartisan bill introduced in the U.S. Senate would make it illegal for minors to use “companion” AI chatbots, with criminal penalties for systems that engage children in sexual or self-harm discussions. Dubbed the...more
Welcome to this month’s issue of The BR Privacy & Security Download, the digital newsletter of Blank Rome’s Privacy, Security & Data Protection practice....more
On November 4, 2025, Canada’s newly elected federal government released its first budget, Budget 2025: Building Canada Strong (Budget 2025). Focusing on increasing competition and supporting innovation, Budget 2025...more
Artificial intelligence (“AI”) continues to transform society in ways beyond imagination. It is rapidly becoming clear that AI pervades every aspect of society, and criminal activity has been no exception. AI is now...more
This year, immigration enforcement has been making headlines, with increased attention on workplace enforcement actions by U.S. Immigration and Customs Enforcement (ICE)....more
A trial court imposed a $10,000 sanction on attorneys for conducting juror research on a social media platform in a $174 million lawsuit. Elliot Weld, Alston & Bird Sanctioned $10K For LinkedIn Juror Research – Law360 (Oct....more
Addressing the many compliance risk areas with a standardized taxonomy is critical for risk and compliance leaders for several reasons. First, defining compliance risks using the standardized Risk Categories and Risk Types...more
The digital age presents a complex challenge: protecting children online while also allowing free speech to continue to be a thriving marketplace of ideas. Originally published in Law360 - August 4, 2025....more
Ed. Note: This is the fifth article in our series, “Conjuring Competitive Advantage: An AI Spellbook for Leaders,” focused on unlocking AI for business with practical steps and insights. Read Part 1, Part 2, Part 3, and Part...more
In the wild new world of TCPA litigation following the end of binding deference to the Federal Communications Commission (FCC), one of the more salient questions is whether the Do-Not-Call (DNC) Registry’s protections extend...more
Department of Homeland Security (DHS) issued a final rule requiring all non-U.S. citizens to be photographed (biometrics) upon U.S. entry and exit. This includes U.S. lawful permanent residents and previously exempt...more
Join us for an insightful discussion on data breach management featuring industry experts: - Harry Buck | Founder and CEO of Legal Outsourcing 2.0, Inc. Harry is an experienced litigator, and the Founder and CEO of Legal...more
The Joint Commission and the Coalition for Health AI released non‑binding guidance outlining principles for the responsible use of AI in healthcare including governance, privacy and transparency, data security, safety event...more
As our readers are aware, California Invasion of Privacy Act (“CIPA”) lawsuits have recently dominated headlines in the California consumer privacy space. Most, if not all, of these lawsuits involve defendants that operate...more
On May 16, 2024, the Securities and Exchange Commission (“SEC”) adopted amendments (the “Amendments”) to modernize Regulation S-P (“Reg S-P”). The Amendments include substantially expanded requirements for safeguarding...more