Data Retention and Document Holds
Trial by Tech: The Evolution of the Digital Courtroom – Speaking of Litigation Video Podcast
Information Security and ISO 27001
No Password Required: LIVE From Sunshine Cyber Con
Calculating eDiscovery Costs: Tips from Brett Burney
No Password Required: President at Constellation Cyber, Former FBI Translator, and Finder of Non-Magical Mushrooms
Managing Large Scale Review Efficiency: Tips From a GC
DE Under 3: US DOL Inspector General’s Office Report Cites IT Modernization & Security Concerns
RegFi Episode 8: The Technological Path to Outcomes-Based Regulation with Matt Van Buskirk
Podcast: Discussing Information Blocking with Eddie Williams
The Data Center Cooling Conundrum With Leland Sparks - TAG Infrastructure Talks Podcast
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Everything Dynamic Everywhere: Managing a More Collaborative Microsoft 365
Law Firm ILN-telligence Podcast | Episode 62: Pierre Hurt, Lutgen & Associes | Luxembourg
ATL1, Atlanta Infrastructure and More With Brandon Peccoralo of Databank - TAG Infrastructure Talks Podcast
Expanded Information Block Rules Go into Effect
5 Key Takeaways | Current Perspectives Around the Convergence of Life Sciences and IT
No Password Required: A Child of the 1980s With a Knack for Storytelling, Comedic Timing, and Building an Elite Cybersecurity Team
Changing Hands: Keys To Downstream M&A IT Integration
Mia Reini and Monica Lopez Reinmiller on a Risk-Based Approach to Managing Employee Hotlines
On 24 March 2025, the following two developments relating to the implementation of the EU Digital Operational Resilience Act (DORA) took place...more
The European Commission has adopted a Delegated Regulation supplementing Regulation 2022/2554 on digital operational resilience for the financial sector (DORA) with regard to regulatory technical standards specifying the...more
The Digital Operational Resilience Act (DORA) is an EU regulatory framework, aimed at enhancing the financial sector’s ability to withstand and recover from ICT (information and communication technology) disruptions....more
What’s in store for the future of AI? That’s the question we set out to answer at a16z’s New York Tech Week....more
The World Trade Organization (WTO) Committee of Participants on the Expansion of Trade in Information Technology Products (ITA Committee) meets on April 11. The committee holds regular meetings twice a year to review...more
Seyfarth Synopsis: Department of Justice (DOJ) issues proposed website accessibility regulations applicable to state and local governments under Title II of the ADA....more
The U.S. Food and Drug Administration (FDA) has published updated draft guidance for industry, Electronic Systems, Electronic Records, and Electronic Signatures in Clinical Investigations–Questions and Answers (Draft...more
The U.S. Department of Justice has announced plans “to publish a Notice of Proposed Rulemaking (NPRM) to amend its Title II ADA regulation to provide technical standards to assist public entities in complying with their...more
On September 30, 2022, the White House kicked off Cybersecurity Awareness Month by reminding citizens of the impacts cyberattacks can have on critical infrastructure such as “electric grids and fuel pipelines … and many other...more
The EU Medical Device Regulation goes into application on 26 May 2020, with the In Vitro Diagnostic Medical Device Regulation set to follow on 26 May 2022. These new Regulations bring sweeping changes to the market clearance...more
The National Labor Relations Board (NLRB) issued a whirlwind series of rulings to cap off 2019. The NLRB typically issues many decisions near the end of a Board member's term, so this flurry comes as no surprise...more
What kinds of cloud computing transactions take place in your jurisdiction? As a G7 economy with mature IT and related services markets, the UK is one of the most important global markets for cloud computing. According to...more
The cybersecurity classified protection regime attracted significant attention when it was included in the Peoples Republic of China (PRC) Cyber Security Law promulgated in 2017 (the CSL). The CSL mandates that network...more
Recent years have seen not so much a leak as a flood of data breaches affecting companies nationwide. But the traditional systems devised to safeguard against data breaches won’t withstand the vulnerabilities created when...more
Information is one of your company’s most valuable assets. Now more than ever before, it is critical to remain vigilant to protect against today’s latest cybersecurity threats and to comply with increasingly expansive privacy...more
Many business owners have faced litigation under the Americans with Disabilities Act (ADA) by disabled individuals who claim the businesses’ websites are inaccessible. ...more
Price algorithms are clearly the “talk of the town” in the European competition law community these days. Just last week, the German Monopolies Commission published a report in which it discusses potential anti-competitive...more
CYBERSECURITY - South Carolina Enacts Insurance Data Security Act - South Carolina Governor Henry McMaster signed the South Carolina Insurance Data Security Act into law on May 3, 2018. The law, parts of which become...more
In the past several months, cryptocurrencies have been all over the news with the meteoric rise in the value of Bitcoin up to $20,000. At its peak in early January 2018, the total market capitalization of all cryptocurrencies...more
As part of the Rocky Mountain Information Security Conference hosted in Denver from May 8 to 10, 2018, Ballard Spahr Privacy and Data Security attorney David Stauss sat down with Robb Reck, Chief Information Security Officer...more