News & Analysis as of

Confidential Information Policies and Procedures Data Security

Paul Hastings LLP

NFL Draft Provides Wake-Up Call on Protecting Confidential Information While Working Remotely

Paul Hastings LLP on

Last week’s NFL draft highlighted more than the accomplishments of athletes at the combine or on the field. While there was extensive coverage of the merits of each player, one of the major headlines coming out of the draft...more

Wolf, Greenfield & Sacks, P.C.

Spring Cleaning and Tune-up for Your Trade Secret Portfolio: Eight Steps

Spring has arrived, and in addition to cleaning, it’s a good time to reassess how your company is handling its trade secrets. Far from being static, trade secret innovations, processes, and data evolve over time. Business...more

Bowditch & Dewey

How to Protect Your Company in the New World of AI

Bowditch & Dewey on

The new technology advancement using artificial intelligence (“AI”), ChatGPT (Chat Generative Pre-Trained Transformer) is a computer model that uses machine learning to generate relevant responses that mimic human-like...more

NAVEX

Part 3: 4 Characteristics of a Successful Whistleblower Hotline

NAVEX on

So far, in this three-part series, we discussed the various kinds of whistleblowing hotlines and the key components that comprise of a whistleblower hotline. In part three, we’ll discuss the four characteristics of a...more

Fisher Phillips

AI Notetaking Tools Are All the Rage – But Should You Use Them? Employers Should Weigh These Risks First

Fisher Phillips on

Perhaps you’ve asked an employee to take notes during a Zoom meeting, but they complained the task is difficult to manage while collaborating with teammates. Maybe you intended to document everything that transpired during an...more

Porter Hedges LLP

Compliance Challenges Arising from the Use of ChatGPT and Artificial Intelligence

Porter Hedges LLP on

On November 30, 2022, OpenAI launched ChatGPT, and the artificial intelligence chatbot quickly became the talk of the corporate world. With over 100 million users, ChatGPT is one of the fastest growing applications of all...more

Reveal

5 Steps to Creating a Successful Data Governance Policy

Reveal on

Data is the lifeblood of your organization. It sets the foundation for new business initiatives, workflows, and innovations. As it grows exponentially, its value also grows immeasurably—that is, if it is effectively managed....more

Rivkin Radler LLP

ABA Provides New Guidance On Remote Work For Lawyers

Rivkin Radler LLP on

On March 10, 2021, the American Bar Association released new guidance for attorneys working remotely. While there has never been a distinction in the Model Rules for Professional Conduct between working in a brick-and-mortar...more

Orrick - Trade Secrets Group

Spring Cleaning: Tidying Up Your “Reasonable Efforts” to Maintain Trade Secrets

It’s among an in-house counsel’s worst nightmares. A former business partner, ex-employee, consultant, or competitor has stolen your company’s trade secret information. Company management demands swift action....more

Sheppard Mullin Richter & Hampton LLP

Ohio Gives Breach Safe Harbor for Companies with Written Data Security Program

Effective November 2, 2018, companies that suffer a breach may have certain defenses in Ohio if they have a written cybersecurity program in place. Under this new law, companies can use as an affirmative defense the existence...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Don't Ignore Privacy and Data Security: Pre-Deal and Negotiation Considerations for Buyers in Merger and Acquisition Transactions

Almost all parties are required to exchange personal data as part of a merger and acquisition transaction. With data breaches on the rise, any buyer in a M&A transaction cannot afford to ignore privacy and data security...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #26 – Get in compliance with state data security laws—this week: CT

We previously reported that several states, including Connecticut and Rhode Island, have adopted data security requirements, similar to the Commonwealth of Massachusetts’ data security regulations that have been in effect...more

12 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide