(Podcast) The Briefing: The Wrong Argument – Why Authors Lost Against Meta and What Comes Next
The Briefing: The Wrong Argument – Why Authors Lost Against Meta and What Comes Next
Lawyers Beware: There Could Be Serious Ethics Issues With The New AI Browsers
From OCR to AI The Future of Media and Image Analysis in eDiscovery
LathamTECH in Focus: Navigating National Security: The Impact of FDI Reviews on Tech M&A
Podcast - Tips for Maintaining FTC Compliance When Using AI
Compliance Tip of the Day: Rethinking Corporate AI Governance Through Design Intelligence
Julie Mortimer of Mills & Reeve on The Right Way to Kickstart Your CRM Strategy - Passle's CMO Series Podcast EP176
Law School Toolbox Podcast Episode 513: Grappling with AI as a Law Student and Lawyer (1L Summer Series)
(Podcast) The Briefing: Anthropic, Copyright, and the Fair Use Divide
The Briefing: Anthropic, Copyright, and the Fair Use Divide
SkadBytes Podcast | Tech’s Shifting Landscape: Five Trends Shaping the Conversation
Hospice Insights Podcast - AI in Action: Exploring How AI Is Helping Hospices Do Things in New Ways
How to Rank in the Age of AI Search: On Record PR
AI in eDiscovery Today: An Open Conversation
Innovation in Compliance: Allison Lagosh on Proactive Compliance Planning for Regulatory Changes
FCPA Compliance Report: Ethical Challenges in AI, Data Protection, and Sports with Andre Paris
Work This Way: An Employment Law Video Podcast | Episode 51: Smarter Recruiting Strategies with Rhiannon Poore of Forge Search
Daily Compliance News: July 9, 2025, The TACO Don Caves Again Edition
CMO Series Live Special: The AI Revolution and What it Means for CMOs
Threat actors are leveraging the publicity around AI tools to trick users into downloading the malware known as Noodlophile through social media sites. Researchers from Morphisec have observed threat actors, believed to...more
On September 19, 2024, the FTC released a Staff Report on the data collection and data use practices of large social media and video streaming service (SMVSS) platforms. The Report describes how these platforms engage in...more
Keypoint: The California legislature enters into the final week of its session with many bills still under consideration. We are currently tracking thirteen privacy and AI-related bills that previously crossed chambers prior...more
Keypoint: Last week, several privacy and AI bills passed out of committee (with some receiving amendments) while two bills died in committee. We are currently tracking thirteen privacy and AI-related bills that previously...more
Key Points - The Senate has passed landmark children’s online privacy and safety legislation via a near-unanimous vote shortly before departing for the August recess. The bill is comprised of revised versions of the Kids...more
El 22/11/23, la Oficina de Ciberseguridad y Protección de Infraestructura Crítica del Departamento del Tesoro de los EE. UU. publicó un Aviso que brinda consejos a los consumidores para evitar convertirse en víctimas de...more
On 11/22/23, the U.S. Department of the Treasury’s Office of Cybersecurity and Critical Infrastructure Protection office released an advisory providing tips to consumers to avoid becoming the victim of cyber or online...more
With scams evolving and growing in volume and maturity, it is more important than ever before to be vigilant about what information is available to nefarious actors. This article provides common scam scenarios, tips for...more
Cyberattacks are a growing threat, with children being among the most vulnerable of targets. The internet serves as a platform for criminals to access children under the guise of anonymity...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more