No Password Required: From AOL to Award-Winning Cuisine to High-Stakes Hacking
Key Discovery Points: Don’t Get Caught with Your Hand in the Production Cookie Jar
How Startups Can Comply With Ever-Changing Privacy Laws
#Risk New York Speaker Series – Bridging the Gap: Effective Risk Communication in Compliance with Rob Clark, Jr.
Privacy for Risk Management: Bridge the Business, Technology and Compliance Gaps
Innovation in Compliance: Real-Time Fraud Prevention Strategies for Financial Loss Prevention with Vince Walden
Rethinking Records Retention
#Risk New York Speaker Series: The Future of AI Governance in GRC with Matt Kelly
The Privacy Insider Podcast Episode 15: TAKE IT DOWN: Online Abuse and Harassment with Carrie Goldberg of C.A. Goldberg, PLLC
Facial Recognition and Legal Boundaries: The Clearview AI Case Study — Regulatory Oversight Podcast
AI on the Job: How to Stay Ahead of Employment and Data Privacy Risks
Podcast: Addressing Patient Complaints About Privacy Violations
Compliance and AI: Using AI for Data Loss Prevention Systems with Vinay Goel
Safeguarding Your Business Data
State AGs Unite: New Privacy Task Force Signals Shift in Regulatory Power Dynamics — Regulatory Oversight Podcast
Constangy Clips Ep. 10 - 3 Ways the GDPR Is Evolving with Today’s Tech Landscape
The Privacy Insider Podcast Episode 14: The Pig Around the Corner: Privacy and Trade with Constantine Karbaliotis of nNovation LLP
State AG Pulse | Massive Google Settlement Shows AGs Serious About Privacy
Podcast - What Healthcare Providers Should Be Telling Students and Interns About HIPAA and Snooping
State AGs Unite: New Privacy Task Force Signals Shift in Regulatory Power Dynamics — The Consumer Finance Podcast
Malicious insiders are the silent threats lurking within organizations—employees, contractors, or partners with privileged access who can cause devastating data breaches. With the rise of remote work and mobile-first business...more
The intersection of litigation, investigations, and technology is becoming increasingly vital to the success of legal teams. As organizations face mounting pressures from data proliferation, complex regulatory landscapes, and...more
The buzzword of “artificial intelligence” (AI) is everywhere. And in the legal industry, it’s being touted as the breakthrough we’ve been waiting for to revolutionize how legal research and discovery are performed....more
Legal professionals often play a crucial role in advising organizations on information governance matters, particularly when it relates to legal and regulatory compliance, data privacy, and risk management. They may provide...more
Document review is the most expensive stage within the discovery process and it's vital for cost-conscious e-discovery professionals to periodically reevaluate their document review process. Additionally with a variety of new...more
The cost of eDiscovery investigations is steadily rising as the scope and volume of data that must be reviewed increases. In addition, the shift to a hybrid working model means employee’s devices aren’t always accessible and...more
The 2015 amendments to the FRCP elevated the importance of proportionality in ediscovery, but has it lived up to its intended purpose? Our panel of speakers will discuss the past, present, and future potential of leveraging...more
2020 has been a year of significant change and adjustment, to say the least: the changes that the WFH era has inflicted on data management; the uptick in litigation across the board; layoffs, budget cuts, and the need to do...more
Technology modernization in the legal world has evolved from upgrading operating systems and adopting modern word processors, to moving critical workflows like ediscovery to the cloud. However, according to the 2019 ILTA...more
In my first major case using technology-assisted review, our team had to review documents in Korean, which brought with them privacy and cross-border transfer concerns. The technology was very helpful, but we still had to...more
To collect or not to collect. That is the question. In discovery, parties must be proportional with what they preserve and collect – avoiding over-collection of information that is not needed, but at the same time not...more