New Executive Order Targets Disparate Impact Claims Nationwide - #WorkforceWednesday® - Employment Law This Week®
Constangy Clips Ep. 10 - 3 Ways the GDPR Is Evolving with Today’s Tech Landscape
Harnessing AI in Litigation: Techniques, Opportunities, and Risks – Speaking of Litigation Video Podcast
Evolving AI Legislation: Federal Policies, Task Forces, and Proposed Laws — The Good Bot Podcast
Nicholas Barrows of Trowers & Hamlins on Blending AI with Human Creativity to Drive Deeper Client Connections - Passle's CMO Series EP172
10 For 10: Top Compliance Stories For the Week Ending May 17, 2025
Podcast - Innovations and Insights in the Palliative Care Space
Regulatory Ramblings: Episode 69 - Human Intelligence vs. Machine Judgment with Nigel Morris-Cotterill and Patrick Dransfield
CareYaya: A Revolutionary Approach to Elder Care
Innovation in Compliance: Innovative Approaches to Compliance and Training with Catherine Choe
Daily Compliance News: May 15, 2025, The Downfall in Davos Edition
Work This Way: A Labor & Employment Law Podcast | Episode 46: The 2025 Greenville SHRM Conference with Tyler Clark and Brittany Goforth of GSHRM
Early Returns Podcast - Oliver Roberts: AI and the Law, and an Education
Daily Compliance News: May 14, 2025, The Widened Whistleblower Program Edition
No Password Required: CEO of HACKERverse.ai, Disruptor of Cybersecurity Sales and Most Other Things
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Daily Compliance News: May 13, 2025, The Leaving on a Jet Plane Edition
FCPA Compliance Report: Upping Your Game in Compliance
Episode 368 — LRN Issues New Report Highlighting Growing Gap in Compliance Program Performance
Creativity and Compliance: From Compliance Enforcers to Trusted Advisors: The Path Forward
White-collar crimes present investigators with intricate challenges that require precision, expertise, and advanced technology. In today’s high-profile investigations, the stakes couldn’t be higher, with reputations,...more
Editor’s Note: In a recent HaystackID webcast, legal professionals explored how HaystackID® Core Intelligence AI™ and its generative AI (GenAI) features can reshape electronically stored information (ESI) discovery. Moderated...more
Legal professionals in cybersecurity, information governance, and eDiscovery face escalating data volumes, data security challenges, high eDiscovery costs, and information management inefficiencies. With AI-enabled workflows,...more
Document review is exceptionally challenging today. Data volumes continue to rise, modern data types require special handling, and risks of disclosing sensitive information are high. This places incredible stress on...more
The emergence of generative machine learning models, such as ChatGPT, has led to a surge in interest in artificial intelligence (“AI”) over the past year. This increased interest extends to the health care industry, where AI...more
In today’s digital landscape, organizations face a constant threat of cybersecurity incidents. Identifying sensitive information and promptly notifying relevant parties during an incident is a daunting challenge. The current...more
The adoption of new and advanced technologies has allowed for a digital transformation across business industries. Infrastructure and services supported by technologies such as artificial intelligence (AI), advanced analytics...more
Many legal professionals are familiar with eDiscovery and the benefits the technology provides. However, what may not be common knowledge is the power that artificial intelligence brings to the table and the techniques that...more
Back in November, I wrote on this blog about Big Data being one of the challenges that is forcing technology to move more to the data sooner in the discovery process. One of the most notable fun facts that illustrate just how...more
Big data can mean big problems in the ediscovery and compliance world – and those problems can be exponentially more complicated when personal data is involved. Sifting through terabytes of data to ensure that all personal...more
As data protection regulations across the world become more stringent, it is increasingly necessary to be able to identify personally identifiable information (PII) and protected health information (PHI) within large volumes...more
The specter of a data breach is an unfortunate reality for anyone that uses a computer. Corporations are obviously large targets, with potentially thousands of employees doing things on computers. Some of those things are...more