FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
A Less is More Strategy for Data Risk Mitigation
Weathering the 2025 Whirlwind: How to Keep Calm & Carry On
Approach to Responsible AI
Why Privacy Matters to Your Business and What's in Store for 2025
No Password Required Podcast: Senior Security Researcher at Nokia and Guardian of Secure AI Networks
Getting Bang for Your Buck: Spend Your 2025 Privacy Budget Wisely
Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025
The Privacy Insider Podcast Episode 10: 2025 Privacy Predictions: Hold My Beer, 2024
AI Talk With Juliana Neelbauer - Episode Three - Cybersecurity Insurance: Coverage Challenges and Changes
No Password Required: Director and Cybersecurity Adviser at KPMG and Rain Culture Authority
Protect, Prepare, Prevail: Navigating a Complex Cybersecurity World
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Crafting an Effective Law Firm Generative AI Policy for Responsible Business Use: On Record PR
2025 Privacy Law Preview: Be Prepared
Podcast - Bowling with Bumpers: Using a Privacy Framework to Set Your Company Up for a Strike
"Monsters Inc." y el tratamiento de los datos
Unlock Privacy ROI: Why Making Cross-Functional Allies is Key
AI Discrimination and Emerging Best Practices – Part 2 - The Good Bot Podcast
The Privacy Insider Podcast Ep. 8: Privacy Over Party: Peter Swire
Protecting trade secrets in any business is critical, but the stakes are higher in life sciences. Given the high focus on innovation in the industry, corporate espionage can result in devastating financial and reputational...more
International travel may pose serious data security risks – especially for your foreign national workers carrying sensitive, proprietary, or regulated information. Travelers must be aware of potential border inspections,...more
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of December 8-14. Here’s what’s...more
Join us as we spotlight select chapters of Venable’s popular Advertising Law Tool Kit, which helps marketing teams navigate the legal risk of campaigns and promotions....more
Trade secrets have become a de facto intellectual property right for securing valuable artificial intelligence information. Despite regulatory trends toward greater transparency of AI models, federal policy acknowledges,...more
An estimated 82% of the data breaches that occurred in 2022 involved human error or intentional misconduct. That’s why organizations need to be diligent in protecting their data from both internal and external threats. One...more
It is often said that the best defense is a good offense. That is certainly true if you are an employer conducting a risk assessment of potential employee defections that could expose your company to losses of valuable...more
Sensitive information is everywhere, from clients’ names and addresses to the trade secrets a business relies on to beat its competition. As such, organizations can’t avoid collecting, processing, storing, and transferring...more
Password manager LastPass, reportedly used by more than 33 million users, recently announced that it was hacked, and although it reports that no passwords of users were compromised in the incident, unfortunately, its source...more
Since its passage almost three years ago, the California Consumer Privacy Act (“CCPA”) has offered California-based consumers certain rights over the personal information companies collect and process about them. While...more
Perhaps no COVID-19 phenomenon will have a more lasting impact than the virtual office. Many employers recently marked the first anniversary of the decision to ask their employees to work from home in an effort to combat the...more
As remote work continues, employers have begun to characterize remote workers as the “invisible workforce” – because remote workers are not able to be seen or monitored in the same way as those performing in-person work. The...more
Cybersecurity was undoubtably on the forefront of the agenda for many organizations in 2020 – and 2021 should be no different. The rapid shift to remote work over the past year has led to an increased number of cybersecurity...more
The COVID-19 remote work era is now in its tenth month, and employees continue to work away from the physical office, without in-person supervision, and perhaps outside of the company network. During this time, many employees...more
The Government has many rules regarding the protection of data. Government contractors must understand these rules and the importance of timely and properly marking data that they own or develop in performance of a government...more
Social media continues to offer an invaluable platform for natural products brands to engage and expand their customer base. In these times, consumers are using social media more and more—particularly on their mobile...more
Increased cellular speed through mobile devices offer increased opportunity for fraudsters to circumvent corporate IT controls by using shadow IT platforms to infiltrate proprietary and confidential data at scale, wreak havoc...more
Each month, Nossaman's complimentary Employment BUZZ webinar series covers a different topic of interest to employers, including tax, insurance, intellectual property and employment issues. These "quick hit" 30-minute...more
Like companies in other industries, a growing number of modern energy-related companies are focusing their efforts on data collection and analysis. For example, Enphase – an energy technology company – regularly tracks data...more
Now entering its ninth month in the United States with no sign of slowing down, the COVID-19 pandemic has forced many employers to make permanent changes to business operations in order to survive. Among the most noticeable...more
Each month, Nossaman's complimentary Employment BUZZ webinar series will cover a different topic of interest to employers, including tax, insurance, intellectual property and employment issues. These "quick hit" 30-minute...more
Host Leigh Tyson interviews . . . Leigh Tyson, as she shelters in place. This special edition of Close-Up on Workplace Law covers wage and hour concerns related to teleworking, how employers can protect their confidential and...more
A federal decision recently reminded businesses about the importance of taking appropriate measures to protect their proprietary information before any misappropriation occurs. In Abrasic 90 Inc. v. Weldcote Medals, Inc., the...more
In recent years, “side hustles” have become an increasingly common phenomenon among employees in all industries to supplement income from a “traditional” job. A key attribute of side hustles is that they are self-managed, and...more
Mark Eting is one of Duncey’s Caps top outside sales agents. Because the company is based in Texas, but Mark lives in Cleveland and sells for the company in the northeast, Mark purchased a personal computer and a laptop to...more