Top Healthcare Compliance Priorities for 2025
Business Better Podcast Episode: Bridging Campuses: Legal Insights on Education Industry Consolidation – Privacy and Data Security
Episode 366 -- DOJ Issues Data Security Program Requirements
FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
Why Privacy Matters to Your Business and What's in Store for 2025
Getting Bang for Your Buck: Spend Your 2025 Privacy Budget Wisely
Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025
The Privacy Insider Podcast Episode 10: 2025 Privacy Predictions: Hold My Beer, 2024
No Password Required: Director and Cybersecurity Adviser at KPMG and Rain Culture Authority
Protect, Prepare, Prevail: Navigating a Complex Cybersecurity World
2024 Privacy Trends and Their Impact on Auto Finance – Moving the Metal: The Auto Finance Podcast
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Crafting an Effective Law Firm Generative AI Policy for Responsible Business Use: On Record PR
2025 Privacy Law Preview: Be Prepared
Podcast - Bowling with Bumpers: Using a Privacy Framework to Set Your Company Up for a Strike
Unlock Privacy ROI: Why Making Cross-Functional Allies is Key
Podcast - Decoding the Future of AI Regulation and Frontier Models
The Privacy Insider Podcast Ep. 8: Privacy Over Party: Peter Swire
No Password Required: Founder of Cybersafe Foundation and an Obama Foundation Africa Leaders Fellow, Who Is Comfortable in the API Kitchen
Podcast - Robots, Rights and New Tech: Balancing Innovation and Data Privacy
Another school year is winding down, and educational leaders perhaps have never been more ready for summer break. From the Trump administration’s significant policy shifts to deeply consequential litigation playing out to...more
As global learning experiences become more common in K–12 education, schools increasingly send staff and students abroad for cultural exchanges, academic competitions, service trips, and more. While these trips offer...more
The PowerSchool data breach, discovered on December 28, 2024, serves as a powerful reminder of the persistent cybersecurity challenges confronting the education sector. PowerSchool, a leading provider of education technology,...more
The Accreditation Overhaul for North Carolina (and Florida) Colleges - Last month, North Carolina Governor Roy Cooper signed House Bill 8 (HB 8) into law. In addition to establishing a new computer science requirement for...more
K-12 school districts across the country continue to be targeted by threat actors looking to steal sensitive personal information. Examples of this can be seen in the recent incidents affecting the Pearland Independent School...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
Dr. Melissa Dark is the Founder of DARK Enterprises, a non-profit organization dedicated to developing and supporting cybersecurity education at the secondary level. Before that, Dr. Dark worked in graduate and college...more
From remote classrooms to student devices—and everything in between—school districts have been thrown into the deep end with no life jacket when it comes to managing cybersecurity. Join us for a discussion of the unique...more
As if this fall weren’t hectic enough, school districts now need to prioritize compliance with a critical new regulation expanding New York state’s Education Law 2D. In effect since October 1, regulation Part 121 places new...more
When it comes to digital threats, universities must protect not only a broad and deeply layered infrastructure, but also vast populations of students. In this episode, Elisa D’Amico and Desiree Moore outline their top five...more
The second post in the series on common legal and regulatory pitfalls that alternative education providers must proactively avoid focuses on data privacy and security. Learn more about student data privacy and best practices...more
In the past few years, we have seen the explosion of “big data,” “data analytics,” “data aggregation,” “predictive modeling,” and “data breaches.” None of these terms existed when I graduated from law school. We have...more
We leave breadcrumbs of biometric information scattered around our daily lives, which may be collected and used by private entities, often without our knowledge or consent. The sound of your voice when you call your bank’s...more