Everyone Come to Play: Exploring FOCI Mitigation Instruments
Legal Alert | Wiretap Laws in the United States
The ‘Long Arm’ of CIPA and Its Newfound Pen-Trap Claims
Episode 298 -- Electronics Communications Risks and Ephemeral Messaging
Compliant Business Communications Through Messaging Apps
Digital Issues for Individuals Working at Home (Digital Planning Podcast)
Employment Law Now IV-54- A Guest Discussion on 3 Significant Government Decisions
Discussion of PA’s Revised Uniform Fiduciary Access to Digital Assets Act
Podcast: Keeping Up with Recent Changes and Trends in Private Fund Regulation
[WEBINAR] The Public Records Act - Taming the Email Tiger
The way we communicate has changed dramatically in recent years, with businesses and individuals moving from traditional email to cloud-based collaboration platforms like Microsoft Teams, Slack, WhatsApp, Skype, and Telegram....more
Like most other States, Maryland has enacted the “Fiduciary Access to Digital Assets Act.” The statute permits the “user” of “digital assets” to authorize a designee to access specified digital assets after the user’s death...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
Modern business communications and the way people interact have rapidly evolved and continue to change. Multimedia, collaborative workspaces, and social media are making communications more dynamic, interactive, and...more
Section 220 of the Delaware General Corporation Law allows stockholders to inspect various books and records of a company upon showing a proper purpose for the request, among other statutory requirements. In this electronic...more
The CLOUD Act resolves the central issue in United States v. Microsoft — U.S. law enforcement agencies now have explicit legal authority to obtain electronic data from U.S. cloud and communication companies regardless of...more
After the terrorist attack in Orlando, Florida, early this month, the Electronic Communications Privacy Act (ECPA) has been discussed quite a bit. The ECPA, a law which took effect in 1986, limits the government’s access to...more
Law enforcement requests for electronic information, particularly from technology companies such as Google and Twitter, have skyrocketed in recent years. In response, several states—Maine and Texas in 2013, Utah in 2014 and...more
The U.S. Senate Committee on the Judiciary held a hearing to discuss reforms to the Electronic Communications Privacy Act (“ECPA”) proposed in Senate bill S. 356, The Electronic Communications Privacy Act Amendments Act of...more