Judge Xavier Rodriguez on Possession, Custody, or Control from the Meet and Confer Podcast
From OCR to AI The Future of Media and Image Analysis in eDiscovery
Future-Ready – Equipping MBD Teams to Navigate and Leverage Emerging Technologies
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 241: Fighting Nurse Burnout with Data-Driven Innovation with Dr. Ecoee Rooney of Indicator Sciences
Rethinking Records Retention
From Dashboards to Data-Driven Decisions – The Evolving Role of Technology in Legal Marketing & BD
Harnessing AI in Litigation: Techniques, Opportunities, and Risks – Speaking of Litigation Video Podcast
Nicholas Barrows of Trowers & Hamlins on Blending AI with Human Creativity to Drive Deeper Client Connections - Passle's CMO Series EP172
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
Compliance into the Weeds: Unsexy Keys to Data Analytics for Compliance Programs
A Blueprint for Efficient SRRs: Mastering Your Subject Rights Workflow
A Less is More Strategy for Data Risk Mitigation
All in the Family: What’s Next for Cloud Attachments in eDiscovery?
Compliance Tip of the Day: Using AI to Manage 3rd Party Risk
Podcast - Bowling with Bumpers: Using a Privacy Framework to Set Your Company Up for a Strike
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
Monumental Win in Data Breach Class Action: A Case Study — The Consumer Finance Podcast
[Webinar] AI and Data Privacy: Minimizing Risk and Maximizing Opportunity
In a sweeping move to bolster national security and safeguard sensitive information, the U.S. Department of Justice (DOJ) has introduced a transformative regulation: the Bulk Data Transfer Rule. ...more
While corporate leaders often view cybersecurity as a technical challenge, contributing author Phil Favro illustrates the legal and organizational dimensions of cybersecurity in this recent article. Favro emphasizes that...more
As businesses move quickly to adopt artificial intelligence agents, contracts for their development and implementation raise novel questions around ownership, accountability, and risk. In this first post of a two-part series,...more
In a move to further bolster data privacy, China’s State Administration for Market Regulation and the Standardization Administration of China jointly issued a national standard, GB/T 45574-2025, Data Security Technology –...more
The EU Data Act (the Act), entered into force on January 11, 2024 but most of its provisions will apply from September 12, 2025. For any organization that designs, manufactures, or uses connected products, provides related...more
Significant data breaches have affected major players in the healthcare industry in the last year, with the methods of attack being as diverse as the affected entities themselves. Originally published in Law360 - June 4,...more
On 3 September 2025, the General Court (GC) of the European Union's Court of Justice dismissed claims in Latombe v. Commission to annul the EU-U.S. Data Privacy Framework (DPF). ...more
In our previous newsletter, we explained how the new UK Data (Use and Access) Act 2025 (“DUA Act”), which modifies the UK’s data and e-privacy regime, has a phased commencement such that most of the provisions require the...more
The California Privacy Protection Agency (CPPA) is now in its second year with full enforcement powers and has begun to exercise its authority under the California Consumer Privacy Act (CCPA) in significant ways in 2025. With...more
Data is at the center of our digital economy and provides endless ways to interact and connect with customers. Maintaining more data means taking on more risk. Join us for an interactive program that begins in the middle of a...more
Learn how Microsoft Purview sensitivity labels, coupled with a sound data classification strategy, reduce over-exposure without hampering collaboration. M365 expert Marta Pucci explains what labels do, the strategic benefits...more
Summary: Traditional data loss prevention tools and workflows weren’t designed to mitigate risks introduced by AI prompts, cloud-native workflows, and browser-based tools. This infographic provides a roadmap data protection...more
Tired of ad blockers, cookie deprecation, and opt-outs undermining your marketing efforts? You may be investigating server-side tracking as a way to grow your access to data. Server-side tracking can be a great approach for...more
With so much data flying around, it’s more essential than ever that personal information remain private. To help make sure of this, there are a growing number of regulations aimed at personal data protection—like the GDPR and...more
You never think about breathing air. Most of the time, you’re not consciously moving your legs as you walk. You don’t have to remind yourself to blink every few seconds. For modern businesses, that’s what processing personal...more
Organizations often struggle with privacy in a regulatory landscape that can change at any point. However, the risk of data breaches is always rising, and awareness of privacy rights is growing. As a result, maintaining the...more
Unless businesses start hiring psychics, certifications will continue to be a critical way for experts to prove that they know what they're talking about. Whether you're looking to hire a privacy professional with the right...more
The COVID-19 pandemic caused office workers to start working from home—but businesses should expect remote work to last a long time. Beyond the unpredictability of this pandemic, 99% of remote workers want to continue...more
The Data Stream podcast dives deep into the fast-moving currents of data, technology, and the law. Presented by BakerHostetler’s Digital Assets and Data Management (DADM) Practice Group and hosted by Partners David Sherman...more
58 In the complex and highly regulated financial services environment, the cost of poor data management is staggering, estimated to cost businesses billions annually in operational inefficiencies, regulatory fines, and missed...more
As the race for real-time data access intensifies, organizations are confronting a growing legal and operational challenge: web scraping. What began as a fringe tactic by hobbyists has evolved into a sophisticated,...more
The Data (Use and Access) Act 2025 (Commencement No. 1) Regulations 2025 (SI 2025/904) have been made and published. The Regulations bring certain key provisions of the Data (Use and Access) Act 2025 (DUAA) into force from 20...more
Finally, after providing the building blocks for strong Information Governance (IG) programs and operationalizing that framework, we discuss how to sustain your IG program in the last part of the series. An effective IG...more
The messages from government agencies and cybersecurity leaders at the end of June were clear – nation-state-sponsored cybersecurity threats are on the rise. Pro-Iranian “hacktivists” are targeting U.S. infrastructure and...more
Thora Johnson shares simple guidance on: Data management for privacy compliance Ensuring data security through storage and retention practices...more