State AGs Unite: New Privacy Task Force Signals Shift in Regulatory Power Dynamics — Regulatory Oversight Podcast
Constangy Clips Ep. 10 - 3 Ways the GDPR Is Evolving with Today’s Tech Landscape
FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
A Less is More Strategy for Data Risk Mitigation
Weathering the 2025 Whirlwind: How to Keep Calm & Carry On
Approach to Responsible AI
Why Privacy Matters to Your Business and What's in Store for 2025
No Password Required Podcast: Senior Security Researcher at Nokia and Guardian of Secure AI Networks
Getting Bang for Your Buck: Spend Your 2025 Privacy Budget Wisely
Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025
The Privacy Insider Podcast Episode 10: 2025 Privacy Predictions: Hold My Beer, 2024
AI Talk With Juliana Neelbauer - Episode Three - Cybersecurity Insurance: Coverage Challenges and Changes
No Password Required: Director and Cybersecurity Adviser at KPMG and Rain Culture Authority
Protect, Prepare, Prevail: Navigating a Complex Cybersecurity World
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Crafting an Effective Law Firm Generative AI Policy for Responsible Business Use: On Record PR
2025 Privacy Law Preview: Be Prepared
Podcast - Bowling with Bumpers: Using a Privacy Framework to Set Your Company Up for a Strike
"Monsters Inc." y el tratamiento de los datos
Unlock Privacy ROI: Why Making Cross-Functional Allies is Key
Recently, there has been an increase in individual rights activity across Europe, particularly organizations receiving Data Subject Access Requests (DSARs) from former employees. ...more
Protecting trade secrets in any business is critical, but the stakes are higher in life sciences. Given the high focus on innovation in the industry, corporate espionage can result in devastating financial and reputational...more
Insider threats continue to present a significant challenge for organizations of all sizes. One particularly concerning scenario involves employees who leave an organization and impermissibly take or download sensitive...more
With organizations holding more and more data digitally, there is an increased need to ensure data remains accessible across the organization at any given time. To that end, many organizations use tools that synchronize the...more
Employee separation commonly involves investigations, litigation, and eDiscovery. Many employees continue to access information from their employers after separation and almost ¾ of employers report that they’ve been...more
Companies continue to adopt Bring Your Own Device (BYOD) policies to save money and relieve employees of the “two-phone burden.” However, such policies come with clear risks. Companies must remain particularly concerned when...more
Five former Memphis-based hospital employees and another man have pled guilty to unlawfully disclosing patient information in violation of HIPAA, U.S. Attorney for the Western District of Tennessee Kevin Ritz announced....more
The construction industry is full of valuable business information including customer lists, pricing information, project budgets, and more. The value of such information may be lost if it becomes known to a competitor or the...more
When I tell people that my law practice is heavily focused on corporate espionage litigation and investigations, the typical response is, “Oh, that sounds really cool.” The word espionage brings to mind secret agents stealing...more
Welcome to FP Forecast, a monthly outlook featuring Fisher Phillips thought leaders providing their insights into what employers can expect in 2022 and beyond. By following along each month, you’ll be in the best position to...more
Our Chief Operating Officer, Kelly Griswold, recently wrote an article for Information Week titled, “The Great Resignation: How to Combat the Knowledge Drain Effect,” where she discussed two key approaches for preserving...more
In this hot labor market, businesses have been laser focused on hiring and retaining talent. While increased employee mobility leads to some exciting hires, it also means some workers are leaving for new opportunities. When...more
A new report from Beyond Identity focuses on old, but very important issues—ending access rights to network systems by terminated employees and the rampant sharing of passwords....more
In late 2019, it was reported by Infosecurity Magazine that 72% of former employees admitted taking company data with them upon departure. Determining what actions a former employee took on a company device leading up to...more
A district court in Tennessee recently concluded in Wachter Inc. v. Cabling Innovations LLC that two former employees who allegedly shared confidential company information found on the company’s computer system with a...more
The U.S. Court of Appeals for the Eleventh Circuit considered the oft-litigated issue of what constitutes reasonable efforts to maintain secrecy of a claimed trade secret in Yellowfin Yachts v. Barker Boatworks, a case...more
In This Issue - Gender Diversity in Patenting: Current Landscape and Recommendations - The gender gap in patenting is a current challenge that companies face. While this issue seems pervasive, companies and lawyers can...more
In a recent Holland & Knight webinar, Partners Kara Ariail, Brandon Elledge, and Terry Elling discussed trade secrets and related issues affecting government contractors when employees are hired or leave. In case you missed...more
When an employee leaves, you understand that you will lose that person’s experience and institutional knowledge. But what if they take more than that? A whopping 87% of employees who leave a job take data with them that they...more
It’s hard to keep up with all the recent changes to labor and employment law. While the law always seems to evolve at a rapid pace, there were an unprecedented number of changes all through 2017. And if the first three months...more
If you’re going to demote or terminate your in-house tech expert, you should plan that event very carefully. Our firm is now helping a client with damage control and data recovery upon discovering – a week after their...more
• The Freedom of Information Act (FOIA) officer for the city of Aurora, Ill., released "largely unredacted" documents in response to an incarcerated felon's request for information about the police officers who worked the...more
The simplest, most valuable, yet commonly overlooked piece of advice any trade secret owner can receive is this: Protect yours trade secrets! It seems crazy that this simple advice warrants repeating, but apparently, it does,...more
TheCloud: Good Morning! TheCloud is a leading cloud-based provider, striving to secure your apps, email and confidential data in the cloud. How may we help you today? Mr. Techie: My name is Mr. TechieTechie, I’m the CEO...more
Florida businesses will soon have an important and powerful new legal cause of action to combat unauthorized access to protected computer systems or data by employees, former employees, directors, officers, and others....more