Investment Opportunities in Italy's Tech Market
The SaaS Tacks – The Ins and Outs of Negotiating SaaS Contracts
Law School Toolbox Podcast Episode 430: The Paxton AI Founders Talk About Their AI Legal Assistant
CMO Series EP100 - Celebrating 100 episodes and exploring the future of professional services marketing
Medical Device Legal News with Sam Bernstein: Episode 10
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Paralegal Insights: A Collaborative Trademark Practice, Series 3
JONES DAY PRESENTS®: Enhancing Trade Secret Protection in Remote Work Environments
Investigative Power: Utilizing Self Service Solutions for Internal Investigations?
Podcast: Unpacking FDA's Final Clinical Decision Support Guidance - Diagnosing Health Care
Software Escrow: An enterprise resiliency tool every legal department should have in their toolbox (with Don Dennis Jr.)
ASG LegalTech CEO Soumya Nettimi Talks Covid, Racial Injustice and The Future of Legal Payments: On Record PR
E8: Interview with Cookiebot CEO on Technical Solutions to GDPR Readiness
New Revenue Recognition Standard-Part III, Shaking Up the Software Industry?
Unfair and Unbalanced-Episode 19
FCPA Compliance Report-Episode 286-Use of Technology in Supply Chain Risk Management
Compiling Successful IP Solutions for Software Developers
Drafting Software Patents In A Post-Alice World
Polsinelli Podcasts - Hear How the SCOTUS Ruling May Impact Patent-Eligible Subject Matter for Software
IP|Trend: New Era in Protection of Software by Intellectual Property Law?
What are the Implications of Alice v. CLS?
According to a new LayerX report, most users are logging into GenAI tools through personal accounts that are not supported or tracked by an organization’s single sign on policy. These logins to AI SaaS applications are...more
On this special edition of Ropes & Gray’s Alumni @ RopesTalk podcast series, technology and IP transactions partner Regina Sam Penti is joined by Dr. Vasanth Sarathy, a professor of computer science at Tufts University and a...more
The Cybersecurity & Infrastructure Security Agency, the Federal Bureau of Investigation, and the Multi-State Information Sharing and Analysis Center released an advisory on February 19, 2025, providing information on Ghost...more
In an era where technology drives business success, organizations often find themselves managing an overwhelming number of tools and applications — whether purchased officially through procurement or individually at a...more
For building owners managing thousands of properties the risk posed by earthquakes is a significant concern. Rapid response is crucial to ensure the safety of occupants and the integrity of buildings. In the aftermath of an...more
Virtually every business has signed an agreement with a software as a service (“SaaS”) provider at one time or another. And now, virtually every SaaS provider (it seems, at least) is coming out with an AI-related feature or...more
In a significant move to bolster the United States’ cybersecurity framework, President Biden issued an executive order (EO) on 16 January 2025 titled “Strengthening and Promoting Innovation in the Nation’s Cybersecurity” days...more
The EU Cyber Resilience Act (CRA) entered into force on 10 December 2024. The CRA is the first legislation of its kind in the world that aims to enhance the cyber security of products or software with a digital component...more
Imagine you’re an associate at a consulting firm. You’re surprised to see a new “AI Assist” button appear in your email application one morning. Without any training or guidance from your firm’s IT department, you decide to...more
Cyber, Privacy, and Technology Report - Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed....more
In today's digital landscape, the exchange of personal information has become ubiquitous, often without consumers fully comprehending the extent of its implications. The recent actions undertaken by the Federal Trade...more
If you have a tendency to reuse the same password across multiple accounts, you could be leaving yourself (and your organization) exposed to risk. Credential stuffing, the stealthy technique fueling a recent explosion of...more
Why does it matter to you? In February of 2024, Change Healthcare, a prominent player in the healthcare industry, fell victim to a ransomware attack that sent shockwaves through its systems and networks. The incident...more
The Internet of Things (“IoT”) has ushered in a new era of connectivity and convenience, but with it comes a host of legal issues and emerging theories of liability. As IoT devices become increasingly ubiquitous in our daily...more
In this episode of On Record PR, Gina Rubel goes on record with Aihong Yu, Chief Privacy Counsel of CDK Global, to discuss how embracing privacy and security measures…...more
In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more
Welcome to the ninth installment in our monthly data privacy litigation report, which we are releasing just after the New Year. We prepare these reports to provide updates on how courts in the United States have handled...more
Report on Patient Privacy 23, no. 10 (October, 2023) Kaiser Foundation Health Plan Inc. and Kaiser Foundation Hospitals will pay California $49 million to resolve allegations that they unlawfully disposed of hazardous waste,...more
By Catherine Ostheimer Being responsive to the growing number of Access Requests and DSARS as a local government organization can be daunting. First, there’s the data management challenge. State and local groups generate...more
Recently, Florida Governor Ron DeSantis signed Senate Bill 262 and Senate Bill 264 into law. These new laws grant Floridians greater control over their personal data and establish a new standard for data handling and...more
If you don’t know where your business collects, stores, and processes consumer data, you can’t manage that data in a compliant fashion. You won’t know whether...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
Almost two years ago, Executive Order 14028 – Improving the Nation’s Cybersecurity (EO) was issued requiring a host of actions be taken by the Federal Acquisition Regulation (FAR) Council, the National Institute of Standards...more
Yesterday we continued our series... with the Office of Management and Budget’s September 2022 memorandum requiring federal agencies to only use software from software producers that attest compliance with secure software...more
Data security will undoubtedly remain an enforcement priority for the Federal Trade Commission in 2023. A presentation on the FTC’s approach to data security by Deputy Chief Technologist Alex Gaynor at a Commission open...more