Harnessing AI in Litigation: Techniques, Opportunities, and Risks – Speaking of Litigation Video Podcast
Nicholas Barrows of Trowers & Hamlins on Blending AI with Human Creativity to Drive Deeper Client Connections - Passle's CMO Series EP172
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
Compliance into the Weeds: Unsexy Keys to Data Analytics for Compliance Programs
A Blueprint for Efficient SRRs: Mastering Your Subject Rights Workflow
A Less is More Strategy for Data Risk Mitigation
All in the Family: What’s Next for Cloud Attachments in eDiscovery?
Podcast - Bowling with Bumpers: Using a Privacy Framework to Set Your Company Up for a Strike
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
Monumental Win in Data Breach Class Action: A Case Study — The Consumer Finance Podcast
[Webinar] AI and Data Privacy: Minimizing Risk and Maximizing Opportunity
Work This Way: A Labor & Employment Law Podcast | Episode 15: eDiscovery for Employers with Angela O’Neal, Nextra Solutions Director
Calculating eDiscovery Costs: Tips from Brett Burney
Work This Way: A Labor & Employment Law Podcast - Episode 6: Digital Forensics & Protecting Trade Secrets with Clark Walton
Managing Large Scale Review Efficiency: Tips From a GC
Record Retention and Information Governance
The Great Link Debate and the Future of Cloud Collaboration
Data Driven Compliance - Malcolm Hawker and Fit for Purpose Data
Employees traveling internationally on behalf of an organization must take steps to protect sensitive, confidential, or proprietary data carried on electronic devices. U.S. Customs and Border Protection (CBP) has broad...more
The Department of Defense stands at a critical crossroads in how it processes, authorizes, and utilizes data in operational environments. Despite living in an era of unprecedented information availability, our military...more
During the 2025 Chinese New Year, DeepSeek, a Chinese artificial intelligence (“AI”) model, garnered intense global attention and sparked heated discussions. It surpassed ChatGPT, which had been in the spotlight previously,...more
Looking for something more advanced than your average export controls conference? Go beyond the basics at ACI’s 2nd Annual Advanced Forum on Global Export Controls. This premier event offers cutting-edge insights and...more
On December 27, 2024, the Department of Justice (DOJ) released a Final Rule, Provisions Pertaining to Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countries of Concern or Covered Persons....more
On November 14, 2024, the Department of Homeland Security (“DHS”) announced a set of voluntary recommendations called the “Roles and Responsibilities Framework for Artificial Intelligence in Critical Infrastructure”...more
On April 26, 2023, China’s legislature approved revisions to the Counter-Espionage Law of the People’s Republic of China (PRC Counter-Espionage Law). A draft version of the law had been released for public comment in December...more
Today, after months of rumors regarding its release and contents, the White House issued its National Cybersecurity Strategy “to secure the full benefits of a safe and secure digital ecosystem.” The full strategy is 39 pages...more
The U.S. government’s national security and economic priorities around encouraging and adopting innovation is on full display in the soon-to-be-finalized Fiscal Year 2023 National Defense Authorization Act (NDAA). In this...more
Report on Research Compliance 19, no. 3 (March, 2022) - Since the start of the year, the Animal and Plant Health Inspection Service (APHIS) has issued notices of alleged violations of the Animal Welfare Act (AWA) to one...more
Beyond causing long lines and shortages at the gas pump, the cyberattack on the Colonial Pipeline this month may have important implications for federal contractors. As part of the federal government’s response, President Joe...more
In the immediate aftermath of the May 7, 2021 Colonial Pipeline ransomware attack, the focus, naturally, is on the rush to get the pipeline back on line after identifying and patching any vulnerabilities that caused the...more
The U.S. Department of Commerce (DOC), Department of Justice (DOJ), and the Office of the Director of National Intelligence (ODNI) jointly issued a White Paper containing information about privacy protections under U.S. law...more
The latest on the potential Oracle/TikTok deal includes news that the Treasury Department has added requirements addressing “how TikTok’s data and source code would be handled and secured” to any potential deal that the...more
The White House has “doubled down” on its recent actions against TikTok by “formally giving ByteDance, the Chinese owner of the popular video-sharing app, 90 days to divest from its American assets and any data that TikTok...more
On January 13, 2020, the U.S. Department of the Treasury (Treasury), on behalf of the Committee on Foreign Investment in the United States (CFIUS or the Committee), issued two sets of final regulations implementing the...more
In data 20 novembre 2019 è stata pubblicata in G.U. la Legge 18 novembre 2019, n. 133 (la “Legge Cybersecurity”), con cui è stato convertito in legge, con modifiche, il Decreto Legge 21 settembre 2019, n. 105 (il “Decreto...more
On September 17, 2019, the Department of the Treasury, on behalf of the Committee on Foreign Investment in the United States (CFIUS or Committee), issued two sets of proposed regulations seeking to further implement the...more
DJI, a supplier of approximately 70 percent of all drones in the United States, announced this week that it will begin manufacturing some of its products in the U.S. DJI plans to repurpose a warehouse in Cerritos, California...more
In the last three weeks, the Committee for Foreign Investment in the United States (CFIUS) has reportedly informed two Chinese companies that they must sell their stakes in two U.S. companies....more
Not all cybersecurity risks are the stuff of super-secret code hacks or high-tech digital attacks. One of the biggest culprits: off-the-shelf thumb drives (also known as flash drives or memory sticks) that you can purchase...more