Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Top Healthcare Compliance Priorities for 2025
Business Better Podcast Episode: Bridging Campuses: Legal Insights on Education Industry Consolidation – Privacy and Data Security
Episode 366 -- DOJ Issues Data Security Program Requirements
FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
Why Privacy Matters to Your Business and What's in Store for 2025
Getting Bang for Your Buck: Spend Your 2025 Privacy Budget Wisely
Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025
The Privacy Insider Podcast Episode 10: 2025 Privacy Predictions: Hold My Beer, 2024
No Password Required: Director and Cybersecurity Adviser at KPMG and Rain Culture Authority
Protect, Prepare, Prevail: Navigating a Complex Cybersecurity World
2024 Privacy Trends and Their Impact on Auto Finance – Moving the Metal: The Auto Finance Podcast
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Crafting an Effective Law Firm Generative AI Policy for Responsible Business Use: On Record PR
2025 Privacy Law Preview: Be Prepared
Podcast - Bowling with Bumpers: Using a Privacy Framework to Set Your Company Up for a Strike
Unlock Privacy ROI: Why Making Cross-Functional Allies is Key
Podcast - Decoding the Future of AI Regulation and Frontier Models
The Privacy Insider Podcast Ep. 8: Privacy Over Party: Peter Swire
No Password Required: Founder of Cybersafe Foundation and an Obama Foundation Africa Leaders Fellow, Who Is Comfortable in the API Kitchen
Ed. Note: This is the last in a series of articles taken from Gavin Parsons' CLE presentation for the North Carolina Bar Association's Antitrust and Complex Business Dispute CLE Program presented on Thursday, January 30,...more
Imagine getting your hands on the ultimate creator cheat code — the behind-the-scenes playbook MrBeast uses to dominate YouTube. Now imagine going viral not for using it, but for allegedly walking off with it. That’s exactly...more
Protecting trade secrets in any business is critical, but the stakes are higher in life sciences. Given the high focus on innovation in the industry, corporate espionage can result in devastating financial and reputational...more
Spring has arrived, and in addition to cleaning, it’s a good time to reassess how your company is handling its trade secrets. Far from being static, trade secret innovations, processes, and data evolve over time. Business...more
When someone violates the secrecy of a company’s trade secrets, what can the company do about it? Writing a sternly worded cease and desist letter is often a good first step that we recommend to clients, however it must be...more
Is your business in compliance with every law, rule, and regulation that it should be? If you can’t confidently say yes, it’s time for a compliance risk assessment. And even if you could confidently say yes six months ago,...more
Regulator proposes requiring content moderation, algorithmic transparency, data protection and security, nondiscrimination, and quality of training data - Regulators around the globe are paying close attention to the...more
Protecting trade secrets is critical for any company. Being proactive and consistent is the best way to keep your company’s secrets safe. Keeping Your Trade Secrets Secret - It is critical for new businesses (and...more
In our first post, we discussed the scope of trade secret protection, as well as how a trade secret is established and enforced. In this second post, we discuss trade secret “hygiene” – that is, best practices for maintaining...more
Below are some of the latest state updates – INDIANA- Indiana Code 24-4.9-3-3, which addresses “reasonable” delays in reporting data security breaches, was amended by H.B. 1351 to impose a forty-five (45) day limit on...more
We previously discussed which portions of an artificial intelligence/machine-learning (“AI/ML”) platform can be patented. Under what circumstances, however, is it best to keep at least a portion of the platform a trade...more
Like companies in other industries, a growing number of modern energy-related companies are focusing their efforts on data collection and analysis. For example, Enphase – an energy technology company – regularly tracks data...more
Learn how your company can prepare to act quickly and strategically to protect important relationships, information and trade secrets at the time that a key employee leaves. This webinar will review the latest developments in...more
Recently I have attended several cyber security conferences. What I have learned about protecting information has changed how I view export controls. Senior management and board members should think about the big picture as...more