Ad Law Tool Kit Show – Episode 12 – Telemarketing and Texting
Consumer Finance Monitor Podcast Episode: Telephone Consumer Protection Act Update: Developments Impacting Consent and Lead Generation
CFPB's Policy Statement on Abusiveness (Part 2) - The Consumer Finance Podcast
Recent Trends in Article III Standing - The Consumer Finance Podcast
Eleventh Circuit Grants en banc Review to Resolve Controversial TCPA Standing Ruling
2022 Year in Review and Look Ahead Crossover With FCRA Focus - The Consumer Finance Podcast
2022 Year in Review and Look Ahead Crossover With The Consumer Finance Podcast - FCRA Focus
FTC Consent Order With Auto Dealer and Proposed Rule - The Consumer Finance Podcast
An Inside Look as a Juror - FCRA Focus Podcast
Recent Trends in TCPA Litigation - The Consumer Finance Podcast
CF on Cyber: An Update on the Changes to the Florida Telemarketing Act
Inside the TCPA, Episode 9: Robocall Mitigation Plans
Is the TCPA Unconstitutional? [More With McGlinchey, Ep. 18]
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Telecommunication Consumer Protection Act (TCPA): Update and Practical Guidance
Discussing the Telephone Consumer Protection Act (TCPA) and the 2020 Election
Top 5 Cybersecurity and Privacy Developments of 2018 and Their Insurance Implications
Health Tech Podcast - Episode 3: HIPAA, HITECH and TCPA
The TCPA: Deep Dive: Details, Class Actions, Regulations, and Defense Strategies
The TCPA: Basics, Targeted Industries, and Trends
Throughout 2020 we saw many enforcement actions brought by EU and U.S. regulators. Whether for allegations of deception (misleading privacy representations) or unfairness (failure to protect information), COVID did not appear...more
This session, Arizona Senate Majority Leader Kimberly Yee (R-Phoenix) introduced Senate Bill 1384 to expand the rights of student journalists. If passed would grant both high school and college level student journalists the...more
This year has been a busy year for education law in the area of data privacy. Educational institutions continue to be a rich target for hackers. Additionally, there were some important developments in the interpretation of...more