No Password Required: From AOL to Award-Winning Cuisine to High-Stakes Hacking
Key Discovery Points: Don’t Get Caught with Your Hand in the Production Cookie Jar
How Startups Can Comply With Ever-Changing Privacy Laws
#Risk New York Speaker Series – Bridging the Gap: Effective Risk Communication in Compliance with Rob Clark, Jr.
Privacy for Risk Management: Bridge the Business, Technology and Compliance Gaps
Innovation in Compliance: Real-Time Fraud Prevention Strategies for Financial Loss Prevention with Vince Walden
Rethinking Records Retention
#Risk New York Speaker Series: The Future of AI Governance in GRC with Matt Kelly
The Privacy Insider Podcast Episode 15: TAKE IT DOWN: Online Abuse and Harassment with Carrie Goldberg of C.A. Goldberg, PLLC
Facial Recognition and Legal Boundaries: The Clearview AI Case Study — Regulatory Oversight Podcast
AI on the Job: How to Stay Ahead of Employment and Data Privacy Risks
Podcast: Addressing Patient Complaints About Privacy Violations
Compliance and AI: Using AI for Data Loss Prevention Systems with Vinay Goel
Safeguarding Your Business Data
State AGs Unite: New Privacy Task Force Signals Shift in Regulatory Power Dynamics — Regulatory Oversight Podcast
Constangy Clips Ep. 10 - 3 Ways the GDPR Is Evolving with Today’s Tech Landscape
The Privacy Insider Podcast Episode 14: The Pig Around the Corner: Privacy and Trade with Constantine Karbaliotis of nNovation LLP
State AG Pulse | Massive Google Settlement Shows AGs Serious About Privacy
Podcast - What Healthcare Providers Should Be Telling Students and Interns About HIPAA and Snooping
State AGs Unite: New Privacy Task Force Signals Shift in Regulatory Power Dynamics — The Consumer Finance Podcast
Under the new administration, the Customs and Border Protection Agency (CBP) is enforcing immigration laws more strictly, thus making the entry landscape into the United States challenging and burdensome for foreign...more
With increasing digitalization of our lives and businesses, privacy concerns from border searches of phones, laptops and tables are a growing concern for professionals, executives, and frequent international travelers. U.S....more
As the U.S. government heightens its focus on national security, international travelers—especially visa holders and lawful permanent residents—are experiencing increased scrutiny at ports of entry. U.S. Customs and Border...more
Recent U.S. government actions have created significant challenges for foreign nationals returning to the U.S. from international travel. To ensure a smoother entry process, travelers should consider taking proactive steps to...more
US Customs and Border Protection (CBP) has the authority to search electronic devices — including phones, laptops, tablets, and other electronic devices — of anyone entering the United States, including US citizens and...more
Cell phone and laptop searches do happen but they are relatively rare. Although the Fourth Amendment right to be free of unreasonable searches and seizures is drastically reduced at a port of entry, as are expectations of...more
Looking for compliance training and networking in your area? SCCE’s Regional Compliance & Ethics Conferences offer practitioners convenient, local compliance training, including updates on the latest news in regulatory...more
CYBERSECURITY - Second Security Directive Issued by TSA to Pipeline Operators - The U.S. Transportation Security Administration (TSA) issued its second Security Directive to the pipeline industry on July 20, 2021,...more
This report helps automotive suppliers inform their legal and operational decisions to help address challenges and opportunities. Key Developments - U.S. new light vehicles sales in May exceeded projections to reach a...more
The COVID-19 global pandemic has been an unprecedented challenge for U.S. employers over the past 12+ months. Among other things, pandemic-containment policies and best practices limited business and personal travel. ...more
2021 promises to be an exciting year in the data and privacy space. With the adoption of technologies that collect, analyze, aggregate, distribute and share data, and the implementation of new laws and regulations in...more
The United States Customs and Border Patrol (CBP) admitted last week that personal information that it collected from travelers crossing the U.S. borders was exposed in a “malicious cyber-attack” against one of its vendors....more
If you’ve flown domestically in the last year, you know the drill. Take off your jacket, belt, and shoes and place them in a bin. Remove your quart-sized bag of 3.4 oz liquids and place them on top. Pull out your laptop,...more
The controversial practice of U.S. Customs and Border Protection (CBP) agents randomly demanding that Americans turn over passwords to their mobile devices so they can be searched at the border and at ports of entry may be...more
This edition of the Cozen O’Connor Aviation Regulatory Update discusses DOT’s launch of an investigation of alleged price gouging by airlines following Amtrak train service disruption in the Northeast Corridor, the agency’s...more