Fashion Counsel: Privacy in the Retail Fashion Industry
Mia Reini and Monica Lopez Reinmiller on a Risk-Based Approach to Managing Employee Hotlines
Welcome to our seventh issue of 2025 of Decoded - our technology law insights e-newsletter. What does the US GENIUS Act Mean for Stablecoins? “The White House categorically states it is a historic piece of legislation that...more
Are you ready to begin adding AI Agents to your human teams? You will soon be getting requests to do so. While business teams will be wowed by what AI Agents and their subagents can do, the artificial intelligence regulatory...more
Complex investigations are on the rise with investigators being asked to do more with less, therefore needing to gain efficiency to handle workloads. A complex investigation can be triggered by a litigation event, government...more
AI is technology that enables computers to simulate human intelligence and problem-solving skills, whereas deepfake is synthetic media that has been digitally manipulated to replace and mimic one person’s likeness. AI has...more
AI tools often drive efficiency and save money, but they have drawbacks. Here’s what to know....more
With AI we face a combination of accelerating technological development and, depending on the jurisdiction, a greater or lesser degree of legislative intervention. Artificial intelligence burst into our collective...more
Cyber Resilience Programs Falling Short on Preparing Workers for a Crisis- “At two-thirds of organizations, there is a fear that almost all employees, 95%, will not understand how to recover following a cyberattack.” ...more
Elon Musk has lobbed in two additional termination letters since his original July 8 letter seeking to terminate his agreement to acquire Twitter for $44 billion. Each termination letter cites alleged false representations...more
Trustwave has reported a new scheme in which threat actors are using the popular Facebook Messenger platform to steal Facebook login credentials. According to the report, the threat actors are using a phishing email to...more
This week I read a worried headline claiming that, in a recent consumer data breach, the hackers had managed to access consumers’ telephone numbers. This was treated as an important and troubling revelation....more
Manufacturers of wireless devices used for Internet of Things (IoT) applications should take heed of new Trump Administration proposals aimed at reducing the cybersecurity threats from botnets and other automated and...more