Everyone Come to Play: Exploring FOCI Mitigation Instruments
Legal Alert | Wiretap Laws in the United States
The ‘Long Arm’ of CIPA and Its Newfound Pen-Trap Claims
Episode 298 -- Electronics Communications Risks and Ephemeral Messaging
Compliant Business Communications Through Messaging Apps
Digital Issues for Individuals Working at Home (Digital Planning Podcast)
Employment Law Now IV-54- A Guest Discussion on 3 Significant Government Decisions
Discussion of PA’s Revised Uniform Fiduciary Access to Digital Assets Act
Podcast: Keeping Up with Recent Changes and Trends in Private Fund Regulation
[WEBINAR] The Public Records Act - Taming the Email Tiger
The way we communicate has changed dramatically in recent years, with businesses and individuals moving from traditional email to cloud-based collaboration platforms like Microsoft Teams, Slack, WhatsApp, Skype, and Telegram....more
Readers of this blog may recall a recent favorable decision handed down by Massachusetts State’s highest court in which it found that Massachusetts Wiretap Act claims (“MWA”) do not extend to consumer interactions with...more
Sorry folks, there is no punchline here, but there are bottom lines from a settlement the Federal Trade Commission (FTC) announced last week. We discuss three today: (1) the FTC continues to mount broad investigations and...more
Companies frequently wish to record telephone conversations related to their operations, customers, or business transactions. In response, the U.S. Congress and most state legislatures have enacted statutes and regulations...more
Nelson Mullins invites you to the two-day webinar, Creating a Data Privacy & Security Playbook for 2024: An Overview of Compliance and Regulations, AI, and Data Breach Concerns, on Feb. 7 and 8 in honor of Privacy Day...more
Honestly, I have been avoiding this topic since it presents a real morass of risks and potential traps for the unwary company and Chief Compliance and Chief Legal Officers....more
Popular file transfer tool MOVEit’s recent data security vulnerability prompted many businesses to communicate, internally and externally, about the impact of the incident on its business. Originally published in Law360 -...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
As a number of recent headlines demonstrate, the U.S. Securities and Exchange Commission (SEC) and other regulators have fined and penalized employers and employees in the financial services industry for non-compliance with...more
This is the second in a series of updates addressing the bilateral data access agreement (Data Access Agreement or agreement) between the United States and the United Kingdom under the Clarifying Lawful Overseas Use of Data...more
Retirement plans are increasingly subject to cybersecurity issues, and the U.S. Department of Labor (DOL) is taking notice. On April 14, 2021, the DOL published cybersecurity guidance “for plan sponsors, plan fiduciaries,...more
United Kingdom, French and Belgian national security laws (and such laws of other EU Member States) fell under the scrutiny of the Court of Justice of the European Union (CJEU), which on October 6, 2020, ruled on whether such...more
The results of recent Fenwick polling suggest that companies generally have insufficient remote-working security controls and data protection practices and are considering a variety of approaches to return-to-work safeguards....more
With offices shuttered and stay-home orders still in place across much of the country due to the COVID-19 pandemic, the task of providing legal services means working from home for nearly everyone, including attorneys and...more
The Digital Planning Podcast is designed to educate individuals about all things digital in connection with estate planning, business planning and estate administration. Your hosts, Jennifer Zegel, Ross Bruch and Justin...more
On January 29, 2020, the United States-Mexico-Canada Agreement (“USMCA”) was signed into law. The USMCA contains a section on digital trade which will impact digital commerce and how data can be handled in the United States,...more
Modern business communications and the way people interact have rapidly evolved and continue to change. Multimedia, collaborative workspaces, and social media are making communications more dynamic, interactive, and...more
Alright. So, you’ve battened down the hatches of your company’s premises, to protect your employees and your information. Employees are required to create secret computer passwords they’re not to share with anyone, even...more
A federal court of appeals recently found that there was nothing wrong with a company monitoring a departed employee’s Facebook account and using that information to pursue a trade secrets claim against four former employees....more
On Thursday, October 8, 2015, California Governor Jerry Brown signed into law the Electronic Communications Privacy Act (the “California ECPA”). This legislation, which takes effect on January 1, 2015, has been heralded by...more
Law enforcement requests for electronic information, particularly from technology companies such as Google and Twitter, have skyrocketed in recent years. In response, several states—Maine and Texas in 2013, Utah in 2014 and...more