DE Under 3: Court Held That Workday Was an “Agent” to Employers Licensing its AI Applicant Screening Tools
Business Associates Here, There, and Everywhere: When Does Your Service Provider Really Need to Sign a HIPAA Business Associate Agreement?
In House Counsel: How To Measure the Effectiveness of Your Staffing Strategy
Sitting with the C-Suite: Identifying Opportunities to Leverage Human Capital
The CCPA for the Land Title Industry: Service Providers and Sale of Data Under the CCPA
Podcast - Risk Management: Troubleshooting & Problem Solving
Cybersecurity in the investment management industry
FCPA Compliance and Ethics Report-Episode 157-Training of Third Parties Under the FCPA
Special Report: The Hot-ish Swag at LegalTech New York 2015
Crafting an AI Governance policy best suited for your business requires careful consideration of the types of AI, how AI will be used, current and future legislation, and a group of individuals specifically designated to...more
Lessons Learned and Best Practices for Seamless Automation - Implementation Automation has become the right-hand resource for many businesses looking to drive greater efficiency and get time back to focus on business...more
On April 14, 2021, the U.S. Department of Labor’s (“DOL”) Employee Benefits Security Administration (“EBSA”) issued its first cybersecurity best practices guidance for retirement plans. The EBSA guidance was highly...more
With the recent wave of ransomware and other security incidents, it is now more important than ever for impacted organizations to have a thorough understanding of each element of a proper data breach response. That includes...more
We’ve previously written on the need for law firms to scrutinize the data security protections in place at all third-party vendors who have access to client confidential information. Clearly, that’s still good advice....more
Since the release of OpenAI’s ChatGPT, the intense hype around large language models (LLMs) and complex AI systems has exploded. Organizations have rushed to both try and buy these new tools. Along with it, a flood of...more
In the current landscape of heightened customer expectations and fierce industry competition, law firms find themselves needing to exceed traditional service delivery norms. The need to go above and beyond in meeting client...more
A few weeks ago, on 24 September 2023, the Data Governance Act (Regulation (EU) 2022/868 of the European Parliament and of the Council of 30 May 2022 on European data governance) (“DGA”) came into force. The DGA aims to...more
The Department of Labor (DOL) recently issued new guidance on best practices for maintaining cybersecurity in connection with ERISA plans (the Guidance). The Guidance, which is intended for sponsors, fiduciaries, record...more
To increase protections for the estimated $9.3 trillion in American retirement assets, the Department of Labor (DOL) has begun a new cybersecurity audit initiative for retirement plans. After providing its first set of...more
For the first time, the U.S. Department of Labor's (DOL) Employee Benefits Security Administration (EBSA) has released cybersecurity guidance aimed at protecting workers' retirement benefits. The guidance, which was released...more
Learning Objectives: - Develop greater understanding of the main US trade restrictions on China and Russia - Gain familiarity into key compliance issues under current restrictions, including related to exports, supply...more
Retirement plans are increasingly subject to cybersecurity issues, and the U.S. Department of Labor (DOL) is taking notice. On April 14, 2021, the DOL published cybersecurity guidance “for plan sponsors, plan fiduciaries,...more
Get the training you need to conduct internal investigations - The SCCE Internal Investigations Workshop provides two days of focused training on conducting compliance-related internal investigations. Attendees also have...more
Today, the U.S. Department of Labor’s Employee Benefits Security Administration (EBSA) issued much anticipated cybersecurity guidance for employee retirement plans. This comes more than four and a half years after the ERISA...more
ANALYSIS - Maximizing Teleconferencing Privacy - With much of the nation under orders that limit employees’ ability to go into the office, organizations around the world are increasingly moving entire businesses online...more
In light of the threats posed by natural disasters, pandemics and civil disorder, among other events, businesses of all types must formulate responses to address significant business disruptions (“SBDs”) and the safety of...more
Best Practices: Lessons Learned from Litigation (#2)—the Vanderbilt Case - I am writing two series of articles that together are called “The Bests.” One is about Best Practices for Plan Sponsors, while the other is about...more
It’s your worst nightmare. All of your most important and sensitive data, the thing your business values most, the thing your company cannot operate without, the thing your regulators require you to protect, has been taken...more
Data breaches continue to be an unfortunate risk that companies face with increasing frequency. In this podcast, Rebecca Bennett, Stephen Riga, and Justin Tarka discuss data breaches from both a U.S. and EU perspective,...more
Although organizations have dealt with privacy issues for years, only in the past decade have they begun to view the complexities of privacy as requiring formal organizational structure, dedicated employees, and/or dedicated...more
Assignment of Benefit Scams - According to the Coalition Against Insurance Fraud, about $80 billion is stolen every year by unscrupulous companies supposedly acting in the best interests of U.S consumers during critical...more
Electronically stored information (“ESI”) can play a vital role in any case, whether it’s family law or business and commercial litigation. If managed appropriately, ESI can not only provide you with critical information,...more
Metadata, terabytes, forensic images, slack space, email archives. So when did they teach this in law school? For most in-house counsel, these are not terms even Webster knew existed when you were in law school, nor are you...more
Data breaches are a reality that all businesses need to take seriously. Knowing your vulnerabilities is only part of the solution. You and your key stakeholders should be prepared with an incident response plan that defines...more