Why Your Data is Key to Reducing Risk and Increasing Efficiency During Investigations and Litigation
CyberSide Chats: Yes, you needed a cyber attorney a long time ago (with Erik Weinick)
CMMC Is Coming: Are You Ready?
FCPA Compliance Report-Episode 326, Paula Long On The Intersection Of Data Security And Compliance
Study Reveals Alarming Statistics On Theft and Employee Misuse of Company Data
Multistate employers with employees in Texas are subject to state laws regarding employment agreements. Whether your business is large or small, specific provisions within your agreements could render your agreements...more
I’m often asked whether employees should have access to the company’s cap table. The cap table is one of the most sensitive and critical documents in any startup. At its most basic level, it lays out who owns what –...more
Our White Collar, Government & Internal Investigations Team offers effective and actionable best practices for companies to follow in conducting their internal investigations....more
In today’s fast-paced business environment, efficient contract lifecycle management (CLM) is essential for maintaining operational integrity and ensuring compliance. At the heart of effective CLM implementations lies data...more
Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more
On October 29, 2024, the Department of Justice (“DOJ”) published its Notice of Proposed Rulemaking (“NPRM”) to implement President Biden’s Executive Order 14117, “Preventing Access to Americans’ Bulk Sensitive Personal Data...more
During an investigation, it is not uncommon to discover that an individual has forwarded business emails to their private email address. This ruling from the Higher Regional Court Munich shows the potential implications of...more
On September 26, 2024, the First Circuit Court of Appeals ruled against extending California’s strict noncompete ban to agreements executed outside of California and governed by another state’s law. This decision highlights...more
A new US National Cybersecurity Alliance survey shows that over one-third (38%) of “employees share sensitive work information with artificial intelligence (AI) tools without their employer’s permission.” Not surprisingly,...more
In the world of business, safeguarding your company’s valuable information is crucial to maintaining a competitive edge. One of the most important assets a company can have is its trade secrets. But what exactly are trade...more
The widespread availability of Artificial Intelligence (AI) tools has enabled the growing use of “deepfakes,” whereby the human voice and likeness can be replicated seamlessly such that impersonations are impossible to detect...more
The Bureau of Industry and Security (BIS) issued new guidance to prevent the diversion of controlled items to Russia. This guidance recommends the use of the Trade Integrity Project (TIP) database, which tracks suppliers with...more
Last week, the National Counterintelligence and Security Center (“NCSC”), the Office of Economic Security and Emerging Technologies (“OESET”) and other coordinating government agencies issued a warning to U.S. venture...more
Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more
On June 20, the Department of Commerce’s Bureau of Industry and Security (BIS) for the first time banned a software and cybersecurity company using authority provided by June 2023’s “Protecting Americans’ Sensitive Data from...more
The Standards provide a framework for all Chinese companies’ sustainability disclosures and the applicability extends beyond listed companies. On May 27, 2024, China’s Ministry of Finance published the new Corporate...more
When it comes to the true source of a company’s value, it’s not necessarily in the products or the services they offer, nor is it in the brand they’ve carefully developed. The core of a company’s value is in the trade secrets...more
Confidential Business Information (CBI) is the information that is unique to the corporation that owns it. It’s anything key to the business that the company would not want its competitors or the public to know. It’s the...more
On January 26, 2023, Cigna Corp. (“Cigna”) sued CVS Health Corp. (“CVS”) and its newly hired chief product officer Amy Bricker (“Bricker”), in the US District Court for the Eastern District of Missouri, for allegedly...more
The integration of artificial intelligence (AI) has revolutionized various industries, offering efficiency, accuracy, and convenience. In the realm of estate planning and family offices, the integration of AI technologies has...more
At the end of May, the Israel Competition Authority’s Director General published a consent decree with Mizra Delicacy Food Industries and Zilber Meat and Sausage Products Industries. Both companies agreed to pay approximately...more
Minnesota’s governor has now signed into law that state’s comprehensive privacy law. For those keeping count – that is number 19 of state “comprehensive” privacy laws, with six in 2024 alone. The Minnesota law will go into...more
Navigating the dynamic landscape of insider risk management requires a nuanced understanding of organisational dynamics, culture and regulatory imperatives. The costs (both direct and indirect) of getting it wrong are high,...more
Dickinson Wright attorney Kim Ruppel recently participated in The Risky Health Care Business Podcast, where she and host Scott Nelson delved into the intricate world of noncompetes and their ramifications for both health care...more