When AI Meets PI: Assessing and Governing AI from a Privacy Perspective
The American Privacy Right Act (APRA) explained
Navigating the Regulation Jungle: How to Be Compliant, Work Efficiently, and Stay Sane
Healthcare Document Retention
Legal Alert | Wiretap Laws in the United States
Business Better Podcast Episode: Cyber Adviser – A Comparison of AI Regulatory Frameworks
Cost of Noncompliance: More Than Just Fines
Will the U.S. Have a GDPR? With Rachael Ormiston of Osano
No Password Required: MITRE Engage Lead, Innovator in Cyber Deception, and Dance Community Builder
Navigating State Privacy Laws: A Conversation with Oregon & Texas Regulators about Privacy Enforcement
The Team Continues to Grow: A Conversation With Our Newest Colleague, Kaitlin Clemens — Unauthorized Access Podcast
Episode 326 -- Dottie Schindlinger on Diligent's Report on Board Oversight of Cybersecurity Risks and Performance
[Webinar] Midyear Data Privacy Check-in: Trends & Key Updates
Information Security and ISO 27001
Decoding Privacy Laws: Insights for Small to Mid-Sized Businesses — Regulatory Oversight Podcast
No Password Required: Education Lead at Semgrep and Former Czar for Canada’s Election Security
Navigating State Privacy Laws
[Webinar] You Are Here: First Steps in Data Mapping
Data Centers: Demand, Development, and Future Challenges With Ali Greenwood — TAG Infrastructure Talks Podcast
AGG Talks: Women in Tech Law - Episode 1: Charting the Course: Women Trailblazing in Cybersecurity and Crisis Governance
From secret formulas to priceless client lists, sensitive information is critical to the continued success of businesses large and small. In business dealings, trade secrets and competitive information are sometimes exchanged...more
For many companies, customer information ranks among its most important assets. Yet these days, employees often keep this sensitive customer information in electronic locations that are not readily accessible to or controlled...more
Any system is only as strong as its weakest link. If your employees aren’t up to date on their cybersecurity hygiene, then it doesn’t matter how much money you spend on technological defences—there’s a gap in your protection....more
A recent survey conducted by Arlington Research for OneLogin in May 2016 of 1,022 respondents found what most of us already know: employees continue to be a high risk for employers when it comes to security risk. The...more
The title, of course, begs the question: does your business even have an Information Governance Program? If not, you should get one—quick. An integrated Information Governance Program is considered a “best practice” to...more
When an employee resigns to join a competitor, it is important to respond promptly. Odds are that the employee has been orchestrating his or her departure for weeks or months. The security of your trade secrets and/or...more
The rate of disclosures of security incidents in 2015 continues at a pace that caused many to call 2013 and then 2014 “the year of the breach.” Most incidents are described publicly with attention-grabbing terms such as...more
With the global economic cost of cybercrime totaling more than $400 billion per year and breaches affecting companies ranging from retailers (e.g. Target, Walmart and Staples) and restaurants (Dairy Queen and Jimmy John’s) to...more
Now that the busy 2014 holiday shopping season is over and the new year has begun, it’s a good time for retail employers to take a breath and think about 2015—what’s coming, what issues they should be watching, and what...more
Three privacy/security stories that you should know as you start your week: President Obama to Offer Cybersecurity/Privacy Previews to State of the Union Proposals - In a series of speeches this week, President...more
Each day, family offices receive, relay, and manage a family’s private information. Depending on the family and the role of the family office, the information managed can be voluminous and include financial information, tax...more
The New Year is here. It is time to make those 2015 resolutions, and not just those for getting fit and healthy. Resolve now to improve your organization’s compliance with the Health Insurance Portability and Accountability...more
California Attorney General Kamala D. Harris has released a “California Data Breach Report,” which presents a series of findings and recommendations based on a review of breaches reported to the Attorney General’s office in...more
In This Presentation: - Overview of data breach landscape - Data breach response ..Technical best practices ..Legal best practices - Data breach prevention ..Technical best practices ..Legal best...more
Businesses are increasingly working together to develop new products and services. With that collaboration is the risk that precious trade secrets will be lost. Attorney Christopher Larus sits down with Seth Northrop to...more
Cost of Data Breach in 2014: - $5.9 million U.S. average cost of a data breach - 15% Annual increase in the average cost of a data breach around the world - $201 Average cost paid for each exposed record ...more
Last month’s Employment Law Commentary discussed the high level of international attention now being paid to protecting trade secrets from misappropriation, with recommendations for practical steps that companies may take to...more
When Wei Wong, owner of Sushi Mushi, a popular Japanese food bistro in Texas, installed a phone add-on to take credit and debit card payments straight from his employees’ phones, his revenues skyrocketed. Yesterday the Feds...more
The more than six billion mobile devices in use worldwide offer companies access to a possible treasure trove of customer information in almost every consumer segment. These devices now create a constant stream of data—from...more
Data security breaches marred the 2013 holiday season for many consumers and retailers. The most famous security breach, at Target Corporation (Target), involved the loss of information on 40 million payment cards and...more
Let’s face it: bring-your-own-device (BYOD) situations are here to stay. With the ubiquity of employees having and using smartphones and tablets – devices that have more capacity and processing power than desktop computers...more