Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Top Healthcare Compliance Priorities for 2025
Business Better Podcast Episode: Bridging Campuses: Legal Insights on Education Industry Consolidation – Privacy and Data Security
Episode 366 -- DOJ Issues Data Security Program Requirements
FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
Why Privacy Matters to Your Business and What's in Store for 2025
Getting Bang for Your Buck: Spend Your 2025 Privacy Budget Wisely
Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025
The Privacy Insider Podcast Episode 10: 2025 Privacy Predictions: Hold My Beer, 2024
No Password Required: Director and Cybersecurity Adviser at KPMG and Rain Culture Authority
Protect, Prepare, Prevail: Navigating a Complex Cybersecurity World
2024 Privacy Trends and Their Impact on Auto Finance – Moving the Metal: The Auto Finance Podcast
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Crafting an Effective Law Firm Generative AI Policy for Responsible Business Use: On Record PR
2025 Privacy Law Preview: Be Prepared
Podcast - Bowling with Bumpers: Using a Privacy Framework to Set Your Company Up for a Strike
Unlock Privacy ROI: Why Making Cross-Functional Allies is Key
Podcast - Decoding the Future of AI Regulation and Frontier Models
The Privacy Insider Podcast Ep. 8: Privacy Over Party: Peter Swire
No Password Required: Founder of Cybersafe Foundation and an Obama Foundation Africa Leaders Fellow, Who Is Comfortable in the API Kitchen
Plugins are like accessories—and Coco Chanel said it best: “Before you leave the house, look in the mirror and remove one accessory.” Your website will work best with simplicity and intentionality. We love plugins because...more
The rapid rise of artificial intelligence (“AI”) is reshaping industries, transforming economies, and presenting profound legal and ethical challenges....more
Since its debut in late 2022, ChatGPT has been hailed as a revolutionary technology with transformative potential, especially within the legal sector. Fast forward to today, and GPT, Claude, and other Large Language Models...more
Cybersecurity is a growing front of concern for legal entities, but just how concerned are lawyers about cybersecurity? Are they as concerned as they should be?...more
As advisor, a lawyer provides a client with an informed understanding of the client’s legal rights and obligations and explains their practical implications. As advocate, a lawyer zealously asserts the client’s position under...more
Clearly, there’s a good reason that Chief Legal Officers (CLO) rank cybersecurity and data privacy among the top three issues most important to their business. Extending those security concerns to third and fourth parties is...more
Since the introduction of the Data Protection Act (the “DPA”) in 2017, there has been a steady increase in the number of data protection breaches that have been reported to the Office of the Ombudsman . It is expected that...more
Every litigator should be able to give a positive answer to the following question: “Did I do everything reasonably possible to protect my clients against the loss of information they entrusted to me?”...more
The Digital Planning Podcast is designed to educate individuals about all things digital in connection with estate planning, business planning, and estate administration. Your hosts, attorneys Jennifer Zegel, Ross Bruch, and...more
Document review, when done well, contains an ideal mix of people, process and technology. COVID-19 restrictions caused eDiscovery teams and service providers to rapidly (and abruptly) shift from a “clean room” to a...more
With Halloween season here, it’s important to be aware of the spooks on the web. It is a scary online world, and now more than ever is the time to take measures to strengthen the security of your website....more
All lawyers face technology threats, ranging from the inconvenient to practice-threatening disasters. From unauthorized access, lawyers risk having confidential information stolen, destroyed or made inaccessible. Hackers...more
Tennessee has joined other states in formally approving lawyers’ cloud-storage of client-confidential data. The Board of Professional Responsibility (“BOPR”) held that lawyers ethically may use cloud storage for...more