Business Better Podcast Episode: Supporting Middle Market Manufacturing – A Conversation with Torque Capital Group
Episode 285 -- The Importance of a Consequence Management System
Overview of California’s New Proposed Cannabis Regulations
CyberSide Chats: Yes, you needed a cyber attorney a long time ago (with Erik Weinick)
[Webinar] Growing Greener: Navigating Environmental Laws in the Cannabis Industry
Shaping the Future of Business Operations: Turning Threat into Opportunity
Stoel Rives | Deeply Rooted Podcast Episode Four: The Financialization of Agriculture with David Muth from Alternative Equity Advisors
COVID-19: New York Travel Guidance, Related Disability FAQs, Reopening/Operating Procedures, School District Update
Episode #2 - Growing a Business with entrepreneur T.J. Rude, Owner of Northern Vessel Coffee Co.
Williams Mullen's COVID-19 Comeback Plan: 10 Pandemic-Influenced Operations, M&A and Finance Ideas for Executives
Law Brief: The Requirements of the SHIELD Act and Other Recommendations for Virtual Business Operations
Strategies for Restaurant Owners to Survive in the New Normal
Global privacy in the age of COVID-19
More Emerging Litigation Claims and Demands from COVID-19
Employer Planning for Coronavirus
As U.S. businesses and organizations continue to utilize and integrate large language models, generative AI, and other artificial intelligence platforms in their operations, it is important to review and update its policies...more
A few years ago, your worst nightmares for your organization might have involved old-fashioned data breaches or class action lawsuits. Those seems like child’s play compared to AI-fueled deepfakes and phishing scams,...more
The digital age has generated an unprecedented data influx threatening even the most formidable enterprises. The challenges are no longer just about competition or market share; it is a battle against time, complexity, and...more
Cybersecurity is a top concern for organizations of all shapes and sizes. Whether it be a global organization or a small business, each will inevitably collect and store consumer data that hackers could attempt to steal....more
Jerich Beason is joined by Erik Weinick. Erik's experience includes privacy, cybersecurity, bankruptcy, commercial torts, defamation/slander, regulatory to name a few. He is also the co-founder of Otterburg’s Privacy &...more
Very recently, various new personal data laws and substantial amendments to existing laws have been promulgated in the Greater China region. For example: - 10 June 2021: New data security laws were promulgated in China...more
[author: Matt Kelly] In September 2020 the National Institute of Standards and Technology (NIST) unveiled the fifth version of its cybersecurity standard formally known as SP 800-53, “Security and Privacy Controls for...more
The coronavirus crisis is far from over, and compliance professionals still need every scrap of guidance that regulators can provide about how to run compliance programs in these difficult times. So when the Securities and...more
Our Virtual Regional Healthcare Compliance Conferences provide updates on the latest news in regulatory requirement, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask...more
Intellectual Property Co-chair Amy Goldsmith and Co-Founder & Managing Partner at AcceleratingCFO Brian Califano join Litigation Partner and host Rich Schoenstein to chat about “The Requirements of the SHIELD Act and Other...more
1. Health and safety planning is critical before employees return to the workplace. Following federal and state safety and health standards, employers should develop a plan for cleaning and sanitizing the workplace, including...more
Biometric technology – technology that identifies individuals based on measurements of their biological characteristics, such as facial geometry, voiceprints, or fingerprints – has become a ubiquitous part of the consumer...more