We get Privacy for work – Episode 6: The Potential Privacy Risks Inherent to Mergers and Acquisitions
Driving Digital Security: The FTC's Safeguards Rule Explained — Moving the Metal: The Auto Finance Podcast
No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion
No Password Required Podcast: Chief Product Officer at ThreatLocker and Advocate of Buc-ee’s, Mascots, and Buc-ee Mascots
No Password Required: Director and Cybersecurity Adviser at KPMG and Rain Culture Authority
AI Talk With Juliana Neelbauer - Episode Two - Cybersecurity Insurance: The New Frontier of Risk Management
On-Demand Webinar: Bring Predictability to the Spiraling Cost of Cyber Incident Response Data Mining
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Unlock Privacy ROI: Why Making Cross-Functional Allies is Key
No Password Required: USF Cybercrime Professor, Former Federal Agent, and Vintage Computer Archivist
Episode 334 -- District Court Dismisses Bulk of SEC Claims Against Solarwinds
Monumental Win in Data Breach Class Action: A Case Study — The Consumer Finance Podcast
Cost of Noncompliance: More Than Just Fines
Will the U.S. Have a GDPR? With Rachael Ormiston of Osano
Work This Way: A Labor & Employment Law Podcast | Episode 14: How Employers Can Navigate Cybersecurity Issues with Brandon Robinson, Maynard Nexsen Attorney
FBI Lockbit Takedown: What Does It Mean for Your Company?
Privacy Officer's Roadmap: Data Breach and Ransomware Defense – Speaking of Litigation Video Podcast
Decoding Cyber Threats: Protecting Critical Infrastructure in a Digital World — Regulatory Oversight Podcast
Life With GDPR: Episode 104 – Solar Winds and Your Mother – Tell The Truth
No Password Required: American University’s Vice Provost for Research and Innovation and a Tracker of (Cyber) Unicorns
We live in an era in which information is a valuable commodity. Access to data, ideas, and trade secrets is in high demand, particularly for individuals or companies seeking to profit from this information. One way they gain...more
Insider threats continue to present a significant challenge for organizations of all sizes. One particularly concerning scenario involves employees who leave an organization and impermissibly take or download sensitive...more
This is the second article in our two-part series on Cybersecurity in the Age of Industry 4.0, focusing on the legal implications and potential liabilities manufacturers face from cyberattacks, as well as practical...more
Editor’s Note: HaystackID hosted an educational webcast on March 15, 2023, to discuss the growing importance of cyber and data hygiene in the context of privacy, cybersecurity, and data protection. The webcast focused on how...more
Baker McKenzie recently released their sixth annual edition of ‘The Year Ahead: Global Disputes Forecast’ in which senior legal and risk leaders share what they expect to see in the coming year. From an overarching...more
Though raising projections for overall economic growth over the next 2 years, the IMF warned this week that “an uneven rollout of vaccines” threatens to add to concerns about a “K-shaped” economic recovery on a global scale. ...more
International companies should keep in mind recent developments coming out of Asia on the privacy front. Chinese authorities are reported to be confiscating smartphones at the border to install surveillance apps. Companies...more
The Situation: Protecting intangible property can be extremely challenging, but significant and effective tools are available under English law to minimize significant harm to entities that have been victimized by a data...more
Google Receives Record GDPR Fine - Marking the first major penalty against a U.S. tech company under the General Data Protection Regulation (GDPR), the French data-protection authority, CNIL, has fined Google a record $57...more
This summer, several automakers, including Tesla, Toyota, General Motors, Ford, and Volkswagen learned that their closely held trade secrets were readily available on the internet. The source? An unprotected back-up server....more
Just days after the European Union’s widely-discussed new data privacy regulations, the General Data Protection Regulation (“GDPR”), took effect on May 25, 2018, another EU-wide legal change quietly occurred. ...more
Waking up to news of another major data breach seems to have become a daily routine. On the front pages and cable news, we hear about hackers, rogue governments, and shadowy figures involved with these data breaches. But too...more
Last week saw a lot of media coverage about “Yelp for People.” The app, called Peeple, allows users to rate friends, co-workers, and romantic partners based on a five-star rating system. Recruiters could review the ratings...more
With stories of cyberattacks and data breaches on a seemingly endless loop, businesses and governments have been doubling down on their efforts to protect digital information and assets. But, in some industries, the greatest...more
Protecting Trade Secrets in the Era of the Data Breach - The prevalence of data breaches cannot be ignored. New data breaches continue to occur one after an-other. In the first half of 2015 alone there were reports of...more
Last month the country learned about the unauthorized access of the Houston Astros “Ground Control” database, which contained trade talks, proprietary statistics, and scouting reports, by members of the St. Louis Cardinals...more
On May 7, Columbia Casualty Company, an insurance company, filed one of the first lawsuits by an insurer seeking to deny coverage for a privacy class action under a cyber insurance policy. Why is this significant? As the...more
Last month’s Employment Law Commentary discussed the high level of international attention now being paid to protecting trade secrets from misappropriation, with recommendations for practical steps that companies may take to...more
Earlier this month, a federal judge in San Francisco sentenced David Nosal to a year in prison, three years’ supervised release, 400 hours of community service, and $60,000 in fines. His crime? Nosal violated the Computer...more
Former Korn/Ferry recruiter David Nosal was sentenced to one year and one day in prison on Wednesday for violating the federal Computer Fraud and Abuse Act and the Economic Espionage Act. In April, a federal jury in...more
With Chinese cyber attacks, data security, and industrial espionage occupying more and more space in the headlines, companies are re-evaluating their strategies for guarding sensitive information. There is certain to be more...more
Today’s hackers and ex-employees steal secrets with USB drives, personal email accounts, and computer networks, making computer forensics critical in detecting trade secret theft....more
On February 20, 2013, the White House issued a report outlining a new plan to combat trade secret theft from U.S. businesses. Faced with the escalating theft of U.S. trade secrets and noting “the crucial role of trade...more