FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
A Less is More Strategy for Data Risk Mitigation
Weathering the 2025 Whirlwind: How to Keep Calm & Carry On
Approach to Responsible AI
Why Privacy Matters to Your Business and What's in Store for 2025
No Password Required Podcast: Senior Security Researcher at Nokia and Guardian of Secure AI Networks
Getting Bang for Your Buck: Spend Your 2025 Privacy Budget Wisely
Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025
The Privacy Insider Podcast Episode 10: 2025 Privacy Predictions: Hold My Beer, 2024
AI Talk With Juliana Neelbauer - Episode Three - Cybersecurity Insurance: Coverage Challenges and Changes
No Password Required: Director and Cybersecurity Adviser at KPMG and Rain Culture Authority
Protect, Prepare, Prevail: Navigating a Complex Cybersecurity World
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Crafting an Effective Law Firm Generative AI Policy for Responsible Business Use: On Record PR
2025 Privacy Law Preview: Be Prepared
Podcast - Bowling with Bumpers: Using a Privacy Framework to Set Your Company Up for a Strike
"Monsters Inc." y el tratamiento de los datos
Unlock Privacy ROI: Why Making Cross-Functional Allies is Key
AI Discrimination and Emerging Best Practices – Part 2 - The Good Bot Podcast
The Privacy Insider Podcast Ep. 8: Privacy Over Party: Peter Swire
The productivity paradox: Does more technology mean less growth? Nobel Prize-winning economist Robert Solow famously remarked, “You can see the computer age everywhere except in the productivity statistics.” This paradox...more
Most people recognize that generative AI, the use of artificial intelligence to generate content, represents an incredible tool. It allows companies and individuals the ability to automate certain processes, use a powerful...more
Security Schedules, Privacy Addenda, TOMs, DPAs—whatever you call them, privacy and cybersecurity contract terms have exploded in prevalence in recent years, bringing with them new importance that can lead to difficult and...more
Since 2018, a consistent stream of newly adopted privacy laws and other regulatory developments (such as GDPR, CCPA, Schrems II, and the new EU Standard Contractual Clauses) has required companies to make regular updates to...more
ACI’s Forum on Employment Practices Liability Insurance is returning to New York City on January 25 – 26, 2022! IN-PERSON and LIVESTREAM options available. This annual conference is the one-stop, must-attend meeting place...more
Gerade für Juristen ist Begeisterung für und ein Verständnis von Branchen, Geschäftsmodellen und Technologien – gerade vor dem Hintergrund des Datenschutzrechts und des Gewerblichen Rechtsschutzes – unerlässlich und...more
With the UK now unambiguously out of the EU, the EU General Data Protection Regulation (2016/679) (“EU GDPR”) has been replaced by the United Kingdom General Data Protection Regulation (“UK GDPR”). In this third instalment of...more
The Government has many rules regarding the protection of data. Government contractors must understand these rules and the importance of timely and properly marking data that they own or develop in performance of a government...more
This is the first edition of UK Litigation Review—an annual publication focused on outcomes, trends and developments in civil litigation over the past year of relevance to both practitioners and clients. This publication...more
Data license agreements have been a hot ticket item of the digital health market and are here to stay. With the exponential growth in licensed data, including de-identified patient data, data license agreement litigation and...more
Technologically savvy shoppers visiting brick-and-mortar retail locations are increasingly engaging in “showrooming,” a practice where consumers use the brick-and-mortar retail location to evaluate a product in person, yet...more
The HIPAA final omnibus rule (Omnibus Rule) made sweeping changes to the HIPAA Privacy, Security, Breach Notification and Enforcement Rules earlier this year. Although the compliance deadline of September 23, 2013 has come...more
Following up on last week’s post, relationships with technology providers – even the best ones – don’t last forever, so it is important to understand whether (and how) you can get your data back when the relationship comes to...more
Lawsuits against employees and contractors, including consultants, for unauthorized use of a company’s confidential and proprietary information are common. For instance, on July 29, Abunassar Impact Basketball LLC filed suit...more