Everyone Come to Play: Exploring FOCI Mitigation Instruments
Legal Alert | Wiretap Laws in the United States
The ‘Long Arm’ of CIPA and Its Newfound Pen-Trap Claims
Episode 298 -- Electronics Communications Risks and Ephemeral Messaging
Compliant Business Communications Through Messaging Apps
Digital Issues for Individuals Working at Home (Digital Planning Podcast)
Employment Law Now IV-54- A Guest Discussion on 3 Significant Government Decisions
Discussion of PA’s Revised Uniform Fiduciary Access to Digital Assets Act
Podcast: Keeping Up with Recent Changes and Trends in Private Fund Regulation
[WEBINAR] The Public Records Act - Taming the Email Tiger
The US Department of Justice Antitrust Division (DOJ or Division) recently released a revised Evaluation of Corporate Compliance Programs in Criminal Antitrust Investigations (Guidance). The Guidance reflects how the Division...more
In today’s rapidly expanding digital realm, keeping up with regulatory requirements in E-com surveillance is more than just a necessity—it’s a game-changer. As the world grapples with the challenges brought by the COVID-19...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
Is your organization using Adobe Experience Manager (AEM) to create user-level individualized website experiences? If so, kudos to you and your marketing team. We’ve been blown away by the degree of granularity and...more