The Privacy Insider Podcast Episode 13: Preserving Privacy and Social Connection with Christine Rosen of the American Enterprise Institute
Innovations in Compliance: Data Collection & Cybersecurity with ModeOne’s Matt Rasmussen and Ryan Frye
Early Days of the Trump Administration: Impact on the CFPB — The Consumer Finance Podcast
CFPB's Inquiry Into Payments Privacy — Payments Pros – The Payments Law Podcast
Innovation in Second Requests: Data is Your Greatest Asset
Podcast: How Delaying Third Party Discovery Can End Up Costing You Dearly
No Password Required: Director and Cybersecurity Adviser at KPMG and Rain Culture Authority
Podcast - Bowling with Bumpers: Using a Privacy Framework to Set Your Company Up for a Strike
The Presumption of Innocence Podcast: Episode 48 - Digital Boundaries: Fourth Amendment Protections in a Connected World
eDiscovery Needs Digital Forensics for a Mobile World
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
EEO-1 Filing After June 4: What to Do Now, and How to Prepare for Next Year - Employment Law This Week®
Navigating State Privacy Laws
[Webinar] You Are Here: First Steps in Data Mapping
An Ounce of Prevention: Keys to Understanding and Preventing AI and Cybersecurity Risks
Calculating eDiscovery Costs: Tips from Brett Burney
State AG Pulse | Content moderation vs. free expression
Work This Way: A Labor & Employment Law Podcast | Episode 14: How Employers Can Navigate Cybersecurity Issues with Brandon Robinson, Maynard Nexsen Attorney
Navigating the Digital Frontier: Employee Privacy Rights and Legal Obligations in the Modern Workplace
Malicious insiders are the silent threats lurking within organizations—employees, contractors, or partners with privileged access who can cause devastating data breaches. With the rise of remote work and mobile-first business...more
In today’s digital world, the way we handle information has transformed dramatically. With this transformation, eDiscovery has become an essential part of legal proceedings and investigations. Whether you’re involved in a...more
For years, the EDRM has been seen as a stepwise, left-to-right process involving endless data movement and multiple tools. But what if you could revolutionize that approach? In this eye-opening session, discover how...more
In alignment with the ongoing concerns from several European data protection authorities publishing guidelines on data scrapping (i.e., the Dutch DPA, the Italian DPA and the UK Information Commissioner’s Office), the Global...more
Join us for a presentation and networking session to celebrate eDiscovery day. In keeping with managing complexity through eDiscovery, come and join ACEDS to hear about changes to the Australian Privacy landscape and what...more
In 2021 CISA released their Incident Response and Vulnerability Playbook, and in 2024 NIST updated their Cybersecurity Framework. Using the Playbook and Framework as a template, forensic teams can build a repeatable processes...more
Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more
Are you aware of the critical role Records of Processing Activities (ROPA) play in your privacy compliance strategy? With the rise in data breaches and an increasing emphasis on data transparency, it's essential to stay ahead...more
Why it matters and how it protects your business - Are you aware of the critical role Records of Processing Activities (ROPA) play in your privacy compliance strategy? With the rise in data breaches and an increasing...more
The most important type of data that no one is thinking about, and how it could be the fatal flaw in your data loss prevention strategy. A company’s Confidential Business Information (CBI) contains its most critical...more
One of the biggest challenges facing in-house legal teams is the ever-changing data landscape. The amount of structured and unstructured data has exploded over the last five years making legal and privacy activities more...more
New study finds legal departments struggling to manage electronically stored information (ESI), resulting in delays and fines. Review the key findings from the 2024 ESI Risk Management & Litigation Readiness Report....more
In today’s digital landscape, organizations face a constant threat of cybersecurity incidents. Identifying sensitive information and promptly notifying relevant parties during an incident is a daunting challenge. The current...more
Corporate counsel and legal teams face unique and growing data-related challenges in this ever-changing regulatory and threat landscape. The risk of litigation continues to rise as data requirements for privacy and compliance...more
In an era where data is often referred to as the “new oil,” an abundance of it can lead to unexpected challenges. Back in 2012, IDC estimated that information workers spent an average of 9.4 hours per week simply sifting...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
It is imperative that a company knows what data it holds, why it is holding it, where it holds it, and who has access to it. The old adage that information is power leads many to believe that holding on to as much data as...more
From nations and states to organizations and individuals, the focus on individuals’ fundamental rights and freedoms coupled with the common concerns for cybersecurity has driven the recognition and requirement for cyber and...more
There’s no denying that data breaches are a major concern for organizations of all sizes, 2021 saw 1,860 data breaches occur (a record high), and 81% of those involved sensitive information like social security numbers and...more
Sensitive information is everywhere, from clients’ names and addresses to the trade secrets a business relies on to beat its competition. As such, organizations can’t avoid collecting, processing, storing, and transferring...more
Data privacy issues continue to be a major topic in e-discovery and litigation, but it can be hard to know exactly what is required by law when it comes to protecting client information. This article discusses how the...more
The automotive industry has been a tight-knit and exclusive club since the 1950s automobile boom. After months of distress caused by semiconductor chip shortages, assembly plant shutdowns, and higher prices, is that still the...more
Organizations have a lot to contend with regarding their data these days. Data is more sensitive than ever, due to ever-changing data privacy laws. Yet, it’s also under siege more than ever with an increasing number of...more
This webinar is intended for eDiscovery professionals interested in the overlap between data privacy and eDiscovery capabilities, workflows and use cases. The tools to tackle the protection of personal data already exist...more
The retention of prolific sensitive, personal electronic information has essentially become a responsibility inherent in the conduct of modern business. From the maintenance of medical records by a healthcare provider to the...more