Data Retention and Document Holds
Trial by Tech: The Evolution of the Digital Courtroom – Speaking of Litigation Video Podcast
Information Security and ISO 27001
No Password Required: LIVE From Sunshine Cyber Con
Calculating eDiscovery Costs: Tips from Brett Burney
No Password Required: President at Constellation Cyber, Former FBI Translator, and Finder of Non-Magical Mushrooms
Managing Large Scale Review Efficiency: Tips From a GC
DE Under 3: US DOL Inspector General’s Office Report Cites IT Modernization & Security Concerns
RegFi Episode 8: The Technological Path to Outcomes-Based Regulation with Matt Van Buskirk
Podcast: Discussing Information Blocking with Eddie Williams
The Data Center Cooling Conundrum With Leland Sparks - TAG Infrastructure Talks Podcast
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Everything Dynamic Everywhere: Managing a More Collaborative Microsoft 365
Law Firm ILN-telligence Podcast | Episode 62: Pierre Hurt, Lutgen & Associes | Luxembourg
ATL1, Atlanta Infrastructure and More With Brandon Peccoralo of Databank - TAG Infrastructure Talks Podcast
Expanded Information Block Rules Go into Effect
5 Key Takeaways | Current Perspectives Around the Convergence of Life Sciences and IT
No Password Required: A Child of the 1980s With a Knack for Storytelling, Comedic Timing, and Building an Elite Cybersecurity Team
Changing Hands: Keys To Downstream M&A IT Integration
Mia Reini and Monica Lopez Reinmiller on a Risk-Based Approach to Managing Employee Hotlines
Generative artificial intelligence (GenAI) is becoming more prevalent in the workplace, including as a tool for human resources (HR) leaders to use in their employment practices. At the same time, close to a dozen states have...more
Remote worker fraud is expected to continue to proliferate in 2025. Fully remote hiring and work, particularly in the technology sector, continues to pose unique business and legal risks for companies. Just in December 2024,...more
In today's fast-paced digital world, businesses often seek to access a global pool of skilled professionals by turning to remote talent to fill gaps in their IT needs. Although this practice has many advantages, it also...more
The opportunity for employees to work from a location of their choice has become the new normal. Remote working offers numerous advantages for employees, including increased flexibility, a better work-life balance, and...more
For most employees, it is relatively easy to send information from the employer’s network to a private digital environment, such as personal e-mail or cloud storage....more
A new US National Cybersecurity Alliance survey shows that over one-third (38%) of “employees share sensitive work information with artificial intelligence (AI) tools without their employer’s permission.” Not surprisingly,...more
We all know that things move quickly in the world of data, and so to celebrate Data Protection Day 2024 (or Data Privacy Day 2024 in North America), we’ve selected ten key themes we think will have the most impact in the year...more
Seyfarth Synopsis: The health care sector faces escalating cybersecurity risks given its size, technological dependence and the sensitive nature of data used therein. According to the U.S. Department of Health and Human...more
Multinationals with employees in the People’s Republic of China (PRC) continue to confront a November 30 deadline to implement China’s new cross-border data transfer mechanism—the Standard Contract. This implementation...more
As artificial intelligence (AI) grows in prevalence and accessibility, it is important for employers to consider the implications of its use by their employees. One method of anticipating and quelling potential liabilities...more
Some social media platforms (SPMs) can be entertaining, but they can also be illegal...if you’re a federal contractor. In late 2022 as part of a larger budget bill, Congress passed the No TikTok on Government Devices...more
The Department of Defense, General Services Administration, and NASA have issued a new interim rule, FAR 52.204–27, implementing Section 102 of Division R of the Consolidated Appropriations Act, 2023 (Pub. L. 117–328), the...more
The construction industry is full of valuable business information including customer lists, pricing information, project budgets, and more. The value of such information may be lost if it becomes known to a competitor or the...more
To date, 71% of the world’s countries feature some form of privacy legislation. More and more businesses are subject to data privacy regulations, and more and more businesses are working hard to ensure they’re respecting...more
In 2023, new comprehensive data privacy laws come into effect in five states — California, Colorado, Connecticut, Utah, and Virginia. The California Privacy Rights Act of 2020 (CPRA) and the Virginia Consumer Data Protection...more
It is every employer’s worst nightmare: an unsuspecting employee receives an email in the early morning from an individual claiming to be his supervisor. The email asks him to follow up on an urgent work assignment that needs...more
Regulatory compliance can be a tough area for HR because few notice when it is done right, but everyone notices if it is done wrong. This study looks at problem areas related to compliance, technology, and the investment of...more
The National Labor Relations Board took the opportunity last week to double down on its recent reversal of the Purple Communications doctrine, holding that T-Mobile USA did not violate federal labor law by implementing a rule...more
Seyfarth Synopsis: As individuals and businesses continue to focus on the rising number of confirmed Coronavirus cases throughout the world and what steps they can take to guard against infection, malicious actors are...more
Few topics have recently dominated the news as much as COVID-19, recognized widely as the Coronavirus. As the virus spreads, schools across Connecticut should be well-prepared to prevent the spread of this infectious...more
Tailgating is a physical security breach in which an unauthorized person gains access to a building or other protected area, usually by waiting for an authorized user to open and pass through a secure entry and then following...more
The National Labor Relations Board (NLRB) issued a whirlwind series of rulings to cap off 2019. The NLRB typically issues many decisions near the end of a Board member's term, so this flurry comes as no surprise...more
For several years now, we’ve been alerting employers about the dangers of phishing scams that attempt to obtain private and personal information from employers... Many of these scams rear their ugly head around tax season,...more
Employees are increasingly exposed to traffic and longer commute times, and some employees drive during the course and scope of their employment. Hands-free technology makes it possible to safely conduct business from a...more
The California Supreme Court issued its long-awaited decision in Dynamex Operations West, Inc. v. Superior Court last week. The weight of the court’s decision to apply a three-prong test to determine whether a worker is an...more