Data Retention and Document Holds
Trial by Tech: The Evolution of the Digital Courtroom – Speaking of Litigation Video Podcast
Information Security and ISO 27001
No Password Required: LIVE From Sunshine Cyber Con
Calculating eDiscovery Costs: Tips from Brett Burney
No Password Required: President at Constellation Cyber, Former FBI Translator, and Finder of Non-Magical Mushrooms
Managing Large Scale Review Efficiency: Tips From a GC
DE Under 3: US DOL Inspector General’s Office Report Cites IT Modernization & Security Concerns
RegFi Episode 8: The Technological Path to Outcomes-Based Regulation with Matt Van Buskirk
Podcast: Discussing Information Blocking with Eddie Williams
The Data Center Cooling Conundrum With Leland Sparks - TAG Infrastructure Talks Podcast
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Everything Dynamic Everywhere: Managing a More Collaborative Microsoft 365
Law Firm ILN-telligence Podcast | Episode 62: Pierre Hurt, Lutgen & Associes | Luxembourg
ATL1, Atlanta Infrastructure and More With Brandon Peccoralo of Databank - TAG Infrastructure Talks Podcast
Expanded Information Block Rules Go into Effect
5 Key Takeaways | Current Perspectives Around the Convergence of Life Sciences and IT
No Password Required: A Child of the 1980s With a Knack for Storytelling, Comedic Timing, and Building an Elite Cybersecurity Team
Changing Hands: Keys To Downstream M&A IT Integration
Mia Reini and Monica Lopez Reinmiller on a Risk-Based Approach to Managing Employee Hotlines
Ready to ditch outdated guidelines and adopt a fresh take on your IT Disaster Recovery plans? Spring is the season of renewal, making it the perfect time to refresh not only physical spaces but also strategies and...more
Since 2019, the number of users on Microsoft Teams has risen 1500%, from a modest 20 million users in the pre-pandemic year (2019) to over 320 million users in 2024. Microsoft's collaboration platform is now the default...more
On October 2, 2024, the U.S. Food and Drug Administration (FDA) released guidance in a question and answer format regarding the use of electronic systems, electronic records, and electronic signatures in clinical...more
In this post in our series on basic cybersecurity concepts for lawyers, we address open-source software (OSS) supply chain risk. OSS is software developed using an “open-source” protocol, meaning that its code is fully...more
The Internet of Things (“IoT”) has ushered in a new era of connectivity and convenience, but with it comes a host of legal issues and emerging theories of liability. As IoT devices become increasingly ubiquitous in our daily...more
What is a Management Body? Under both DORA and NIS2, a management body can be a body with managerial and/or supervisory functions. The powers and structure of management bodies vary within the EU Member State, and managerial...more
Pressure for companies to use AI to gain a competitive advantage (or at least not fall behind versus competitors) is steadily rising, and in 2024, CEOs will push their Legal, Compliance, Privacy, and IT Teams to deploy AI...more
Seyfarth Synopsis: The health care sector faces escalating cybersecurity risks given its size, technological dependence and the sensitive nature of data used therein. According to the U.S. Department of Health and Human...more
The emergence of ChatGPT and other generative artificial intelligence (AI) tools has triggered widespread debates about the propriety of their use, especially in education circles, where academic integrity and confidentiality...more
This post provides some tips from eDiscovery experts on what to consider ahead of any investigation commencing. Consider ease of compliance when procuring chat software The pandemic accelerated the adoption of chat and...more
Editor’s Note: In a rapidly evolving technological landscape, understanding the capabilities and limitations of platforms like Microsoft 365 (M365) is crucial for law firms, especially in the realms of eDiscovery and...more
Key Point: The decision making processes to determine whether a cybersecurity incident is material or not, should include documenting the factors behind each determination and should be practiced before an incident occurs. ...more
It has been a full year since the initial comment period closed on the Securities and Exchange Commission’s (“SEC”) proposed rule on cybersecurity disclosure, governance, and risk management for public companies (the...more
As U.S. regulators and enforcement authorities alike become increasingly focused on corporate oversight practices of their employees' use of third-party messaging applications, including ephemeral messaging, companies should...more
On March 15, 2023, the U.S. Securities and Exchange Commission (“SEC”) released its proposal to amend Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Customer Information (the “Proposed...more
Internal investigations play a critical role in mitigating insider risks, and technology is making the job of investigators easier. Nevertheless, organizations can make missteps that jeopardize the effectiveness of...more
The attention on IT Risk and Cybersecurity risk management policies is reaching new heights — again. It doesn’t matter if you’re a large enterprise like Uber or a small / midcap company; there’s one common thread as we start...more
In the not-so-distant past, there were fewer channels utilized for business communications, and business norms often limited communications to traditional channels even if other methods of communication were available. This...more
Cybersecurity is the goliath of tech-related concerns for companies of all sizes, not just large corporations. The Cybersecurity & Infrastructure Security Agency (“CISA”) encourages small and midsize businesses to focus on...more
Multi-national organizations battle fraud and corruption risks daily given the size, scale, and complexities of their businesses, increased regulation and enforcement, and challenges preparing for a post-pandemic fraud...more
Just how confident are you that your company is prepared to tackle whatever litigation comes your way? If your answer is less than “highly confident,” you’re not alone. In its 2022 Global Disputes Forecast, law firm Baker...more
Over the years, smart home technology has improved, expanded, and become more reasonably priced. As a result, homeowners are increasingly including it in their construction plans. While the conveniences of smart home...more
The U.S. Cybersecurity & Infrastructure Agency (CISA) has issued a rare “shields up” warning regarding cybersecurity attacks, saying that every organization, of every size, should be prepared to respond to disruptive cyber...more
Report on Patient Privacy 21, no. 11 (November, 2021) - Attorney Brad Hammer doesn’t always don a suit and tie, or what he calls his “lawyer’s uniform.” A privacy and security expert and founder of the Vakaris Group based...more
The CFPB updated its Supervision and Examination Manual by adding a new section titled Compliance Management Review – Information Technology. The new examination procedures are meant to assist CFPB examiners when assessing...more