eDiscovery and Compliance Programs
Managing Whistlelbowers
Compliance Tip of the Day: Using AI to Embed Your Compliance Program
Culture Crafters: Building a Culture of Accountability in the Face of Disasters
Compliance Tip of the Day: Trust and Verify
Compliance Tip of the Day: AI Assistant for Compliance
Compliance Tip of the Day: Costs and Benefits of AI
(Podcast) The Briefing: Who Owns What – Understanding Copyright in Collaborative Projects
Fox on Podcasting: Mastering Content Creation and Personal Branding with Dave Polykoff
Compliance Tip of the Day: How a CFO Views Compliance and Risk
Compliance Tip of the Day: Co-Thinking with AI
Nonprofit Basics: Grant Agreements—Matching Grants, IP, Recoverable Grants & More
Compliance Tip of the Day - Extending Compliance Value Across Your Organization
AI Today in 5: August 12, 2025, The Creating Billionaires Episode
Compliance Tip of the Day: Design - Centric Internal Controls
Compliance Tip of the Day - The ROI of Compliance
Adventures in Compliance: The Novels - The Valley of Fear, Sherlock Holmes’ Investigative Techniques for Today’s Challenges
8 Key Takeaways | Strategies to Drive Influence With and Without Authority
Moving Beyond the Usual Helpline Data
Nonprofit Basics: Grant Agreement Best Practices
Outside Counsel Guidelines (OCGs) are more than static billing recommendations; they are living and breathing instructions that align teams with corporate values, risk tolerance, and operational expectations. While other...more
Artificial Intelligence (AI) is transforming the legal profession, offering tremendous opportunities to enhance efficiency and access to justice. While AI tools are reshaping how legal professionals operate, the use of AI in...more
As recent innovations in automotive technology continue to fuel unprecedented growth across the industry, companies must adapt their privacy and confidentiality capabilities to safeguard highly valuable trade secrets. With...more
This CLE webinar will guide counsel on navigating the challenges when using AI in the practice of law. The panel will address ethical issues and privacy and security considerations. The panel will also offer best practices...more
The number one risk for trade secrets exfiltration is from insider threats—employees, contractors, or even executives with access to sensitive information who either intentionally or accidentally compromise it. Sometimes it’s...more
As legal and business professionals focused on protecting intellectual property—especially those of us in business litigation—it's crucial to stay attuned to the expanding influence of generative AI (“GenAI”). While patents...more
Law firms handle confidential information and documents that require diligent protection. The stakes are high, the regulations and their sources are vast, and technology is sophisticated and ever-changing....more
We’ve previously written on the need for law firms to scrutinize the data security protections in place at all third-party vendors who have access to client confidential information. Clearly, that’s still good advice....more
In this webinar, discover why data security is more than a checkbox and gain insights into the risks and best practices that can safeguard your organization. Join industry experts as they delve into the risks, laws and...more
Perhaps you’ve asked an employee to take notes during a Zoom meeting, but they complained the task is difficult to manage while collaborating with teammates. Maybe you intended to document everything that transpired during an...more
Whether your organization has deployed a generative AI tool for your employees or hasn’t (yet) hopped on the bandwagon, the time is now for you to create a workplace policy governing the use of the technology. Many...more
It is often said that the best defense is a good offense. That is certainly true if you are an employer conducting a risk assessment of potential employee defections that could expose your company to losses of valuable...more
Despite strengthening security across and beyond the business, many legal organizations overlook a critical vulnerability with surprising frequency – the risk presented by third parties. Cybersecurity risk is further...more
NFTs – or non-fungible tokens – are increasingly popular among artists, sports figures, and the video game industry. But NFTs (some selling for upwards of eight figures) are not just for gamers, Mark Cuban, and the ultra...more
As remote work continues, employers have begun to characterize remote workers as the “invisible workforce” – because remote workers are not able to be seen or monitored in the same way as those performing in-person work. The...more
The bad news first. An estimated 3.5 million cybersecurity positions will be unfilled globally by 2021.* Leaving data security entirely up to the professionals isn’t a viable option. Like it or not we’re all on the...more
In recent years, “side hustles” have become an increasingly common phenomenon among employees in all industries to supplement income from a “traditional” job. A key attribute of side hustles is that they are self-managed, and...more
FCC Working Group Issues Report On Cybersecurity Best Practices – The June 2015 issue of the Intellectual Property & Technology Law Journal features an article by King & Spalding partner Steven Snyder on a Federal...more