A Less is More Strategy for Data Risk Mitigation
AGG Talks: Cross-Border Business Podcast - Episode 26: U.S. Enforcement Trends Targeting Foreign Pharmaceutical and Medical Device Manufacturers
Key Discovery Points: Even AI Experts Can Get Faked Out
PilieroMazza Annual Review: What DOJ’s 2024 FCA Report Means for Government Contractors
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 223: Cybersecurity and Privacy Risks with Healthcare Vendors with Brandon Robinson of Maynard Nexsen
Government Contracts and New Mandates Executive Orders and Cost Recovery Strategies Explained
Podcast: Are Legal Holds Protected by Privilege? Insights from the FTC's Battle with Amazon
Consumer Finance Monitor Podcast Episode: Regulating Bank Reputation Risk
4 Key Takeaways | AI in Precision Agriculture Legal Risks and Mitigation
The Duty to Cooperate Under a Liability Policy
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Preparing for CMS Staffing Mandates — Assisted Living and the Law Podcast
Everyone Come to Play: Exploring FOCI Mitigation Instruments
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 211: Cybersecurity and Privacy Risks for the Healthcare Industry with Brandon Robinson of Maynard Nexsen
Fraud Prevention Techniques for Nonprofit Organizations - Part 3
Steps Your Nonprofit Can Take to Mitigate Fraud Risks - Part 2
Why Retailers and Merchants Should Pay Attention to the CFPB - The Consumer Finance Podcast
The Justice Insiders Podcast - The Ever-Expanding Net: Corporate Compliance in an Era of Increasing Trade Sanctions and Restrictions
Fraud Risks at Nonprofit Organizations - Part 1
False Claims Act Insights - If Everything Matters, Nothing Does: Parsing Materiality in FCA Disputes
This article is based on Carri Bennet’s April 9th presentation at the Palmetto Broadband Coalition Annual Convention in Greenville, S.C. In December 2024, the White House’s Deputy National Security Adviser for Cyber and...more
The Federal Communications Commission is enhancing its Robocall Mitigation Database (RMD) compliance obligations and increasing base forfeiture amounts for RMD violations. The FCC’s new rules follow a recent Enforcement...more
Join industry experts Allison Spagnolo, Asha Muldro, and Matt Corwin as they dive into the rapidly evolving landscape of AI governance, privacy concerns, and the legal frameworks that are shaping corporate compliance. As AI...more
Google and Microsoft are spearheading the Coalition for Secure AI, focusing on supply chain security and mitigation strategies. Whether this attempt at self-regulation will ultimately succeed is unknown, as it overlaps with...more
Federal Communications Commission Takes Further Action Against Provider Facilitating Illegal Tax Robocalls - Following up on its previous enforcement actions, the Federal Communications Commission’s (Commission)...more
Commission Declares TCPA Prohibits AI-Generated Voices - Following up on January’s update, the Federal Communications Commission (FCC) issued a Declaratory Ruling that confirms that the prohibitions in the Telephone...more
On January 25, 2024, the Federal Communications Commission (“Commission”) released a draft Report and Order and Further Notice of Proposed Rulemaking (“Further Notice”) for consideration at its February 15, 2024, Open...more
Unmanned Aircraft Systems (UAS or drones) are increasingly popular in the United States and around the world. While most UAS operators operate safely and comply with relevant laws, growing security and privacy concerns over...more
In this month's edition of our Privacy & Cybersecurity Update, we examine the National Institute of Standards and Technology's four principles of the "explainability" of artificial intelligence and the U.K. Information...more
On January 18, 2017, during the final days of the Obama Administration, the Federal Communications Commission (“FCC”) released a white paper (the “FCC Paper”) on cybersecurity risk mitigation in communications networks. The...more
In this edition of our Privacy & Cybersecurity Update, we take a look at the FCC's new rules for broadband privacy, the FTC's new playbook for data breach response and notification, the NHTSA's voluntary guidance for...more
Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more