When AI Meets PI: Assessing and Governing AI from a Privacy Perspective
The American Privacy Right Act (APRA) explained
Navigating the Regulation Jungle: How to Be Compliant, Work Efficiently, and Stay Sane
Healthcare Document Retention
Legal Alert | Wiretap Laws in the United States
Business Better Podcast Episode: Cyber Adviser – A Comparison of AI Regulatory Frameworks
Cost of Noncompliance: More Than Just Fines
Will the U.S. Have a GDPR? With Rachael Ormiston of Osano
No Password Required: MITRE Engage Lead, Innovator in Cyber Deception, and Dance Community Builder
Navigating State Privacy Laws: A Conversation with Oregon & Texas Regulators about Privacy Enforcement
The Team Continues to Grow: A Conversation With Our Newest Colleague, Kaitlin Clemens — Unauthorized Access Podcast
Episode 326 -- Dottie Schindlinger on Diligent's Report on Board Oversight of Cybersecurity Risks and Performance
[Webinar] Midyear Data Privacy Check-in: Trends & Key Updates
Information Security and ISO 27001
Decoding Privacy Laws: Insights for Small to Mid-Sized Businesses — Regulatory Oversight Podcast
No Password Required: Education Lead at Semgrep and Former Czar for Canada’s Election Security
Navigating State Privacy Laws
[Webinar] You Are Here: First Steps in Data Mapping
Data Centers: Demand, Development, and Future Challenges With Ali Greenwood — TAG Infrastructure Talks Podcast
AGG Talks: Women in Tech Law - Episode 1: Charting the Course: Women Trailblazing in Cybersecurity and Crisis Governance
The integration of artificial intelligence (AI) into the legal system heralds a transformative era marked by both innovation and unprecedented challenges. After some lawyers made headlines for submitting legal briefs with...more
The biggest data privacy litigation risk companies currently face is class action litigation based on the use of certain website advertising technology (adtech). Are you wondering what this means for your company? This alert...more
Cybersecurity is a growing front of concern for legal entities, but just how concerned are lawyers about cybersecurity? Are they as concerned as they should be?...more
As the new year begins, it’s a perfect time to review business practices and policies, and one very important consideration is security. Whether you work from home or in an office building, you have invaluable information on...more
Since the introduction of the Data Protection Act (the “DPA”) in 2017, there has been a steady increase in the number of data protection breaches that have been reported to the Office of the Ombudsman . It is expected that...more
Since so many of us began working from home in the spring of 2020, we have been hearing how important security is. Information on VPNs, encryption, and other measures to protect data have been rolling out regularly for many...more
The Digital Planning Podcast is designed to educate individuals about all things digital in connection with estate planning, business planning, and estate administration. Your hosts, attorneys Jennifer Zegel, Ross Bruch, and...more
Law firms have had to make comprehensive adjustments to our usual way of doing business in light of the COVID-19 pandemic. Originally published in The Philadelphia Bar Reporter - April 2020....more
The future is now. Artificial intelligence is all around us, from our homes to our workplaces to our hospitals. Automobiles drive themselves. Wearable devices track our every move and measure our health. Our genetic code can...more
On April 18, 2019, IRS released the IRS Integrated Modernization Business Plan April 2019 (Plan) - a six year Plan designed to modernize the IRS’ technology systems, improve Taxpayer services and protect Taxpayer data. ...more
The European Union's General Data Protection Regulation ("GDPR") is arguably the most comprehensive - and complex - data privacy regulation in the world. Although the GDPR went into force on May 25, 2018, there continues to...more
All lawyers face technology threats, ranging from the inconvenient to practice-threatening disasters. From unauthorized access, lawyers risk having confidential information stolen, destroyed or made inaccessible. Hackers...more