No Password Required: American University’s Vice Provost for Research and Innovation and a Tracker of (Cyber) Unicorns
No Password Required: A Security Engineer and Budding Surfer Who Took PentesterLab From Side Hustle to Global Success
No Password Required: A Developer Advocate with Auth0 and an "Accordion Guy" with Rockstar Aspirations
No Password Required: Former Commander, United States Central Command, Executive Director of Cyber Florida and an Appreciator of Battlefield Beef Enchiladas
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Hybrid Workforces and Compliance with Sheila Limmroth
[Podcast] Prioritizing Cybersecurity in a Hybrid Workplace
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
Digital Planning Podcast - Interview With Leeza Garber
Happy Password Day
Zoom Security Best Practices
Data Privacy Legislation, Part 2 (and bonus tips on teleworking from two law mamas who feel your pain!)
Compliance Perspectives: Cybervigilance and Cyber-resiliency
Life With GDPR: Episode 26- The Importance of Passwords
Employment Law This Week: Password Sharing, Organizing Mixed Units, Mental Health Accommodations, Privacy Shield
Employer Social Media Policies – Interview with Mitch Danzig, Member, Member, Mintz Levin
As More States Implement Social Media Password Laws, There’s Still Some Blind Spots
How to Protect Your Company From Hackers
The Basics of Michigan’s Social Media Password Law & Why It Isn’t Such a Great Idea
“What’s that password again? Where did I write these log-ins down again? Was it this password or the one I came up with three years ago?” Consider the daily frustrations we encounter with the bevy of passwords we need for...more
If you’re like most people, you’ve probably encouraged your elderly relatives to list of all their assets and contact information, including passwords to online accounts. This will enable you or other family members to access...more
The Digital Planning Podcast is designed to educate individuals about all things digital in connection with estate planning, business planning, and estate administration. Your hosts, attorneys Jennifer Zegel, Ross Bruch, and...more
Generally, every estate plan requires a will, but this main attraction may be complemented by other documents, like a letter of instructions. The letter, unlike a valid will, isn’t legally binding, but can be valuable to...more
People sometimes keep assets hidden without letting their family know about their existence or location. Similarly, they may have life insurance policies no one knows about. This brief article explains, through a fictional...more
The digital revolution has touched virtually every aspect of our lives. The result is that one likely has at least a handful of “digital assets.” These assets may include personal assets, such as online bank and brokerage...more
Many people have thoughtfully gathered information on the location of their bank accounts, deeds, lock boxes, safe combination, car title (and keys), investment accounts, check books, and other assets to make handling their...more
Over the holidays, it’s likely that you or a loved one received some type of computer or device that connects to internet websites, e-mail and applications. Or that pictures were taken and stored on such a device, or that...more
In an article earlier this year we noted that at a large number of states had introduced legislation to address an emerging issue that is unique to our Information Age: how will our digital assets be accessed and used (or...more
We, as a society, are gradually moving away from paper bank statements, jars with money in them, and instructions to loved ones scribbled on notepads. With the growth of our online presence, our lives can be governed almost...more
In the not-so-distant past, one likely kept copies of vital estate planning documents locked in a fire-resistant vault or file cabinet, with copies at an attorney’s office. However, in this digital age, it’s more likely that...more
Do you have a personal laptop computer, iPad, iPhone or other personal electronic device requiring an access password? Who, besides you, has that information? If something happens to you, how will your information be...more
A government publication called the Consumer Action Handbook refers to the preparation of a social media will. Many people have online accounts of various types. What happens to them when you die?...more
At first, the digital age crept upon us slowly. Businesses looked at the internet skeptically, not sure how to use it. Consumers waded in bit by bit, at first dipping the proverbial toe in the water and then taking it step by...more