Podcast - Regulating AI in Healthcare: The Road Ahead
No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats
We get Privacy for work – Episode 6: The Potential Privacy Risks Inherent to Mergers and Acquisitions
Compliance Tip of the Day: Rethinking Corporate AI Governance Through Design Intelligence
FCPA Compliance Report: Ethical Challenges in AI, Data Protection, and Sports with Andre Paris
We get Privacy for work: The Privacy Pitfalls of a Remote Workforce
No Password Required: From AOL to Award-Winning Cuisine to High-Stakes Hacking
Everything Compliance: Episode 156, To Document or Not Edition
AI on the Job: How to Stay Ahead of Employment and Data Privacy Risks
State AGs Unite: New Privacy Task Force Signals Shift in Regulatory Power Dynamics — Regulatory Oversight Podcast
Constangy Clips Ep. 10 - 3 Ways the GDPR Is Evolving with Today’s Tech Landscape
The Privacy Insider Podcast Episode 14: The Pig Around the Corner: Privacy and Trade with Constantine Karbaliotis of nNovation LLP
FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
A Less is More Strategy for Data Risk Mitigation
Weathering the 2025 Whirlwind: How to Keep Calm & Carry On
Approach to Responsible AI
Why Privacy Matters to Your Business and What's in Store for 2025
No Password Required Podcast: Senior Security Researcher at Nokia and Guardian of Secure AI Networks
Getting Bang for Your Buck: Spend Your 2025 Privacy Budget Wisely
Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025
Protecting trade secrets in any business is critical, but the stakes are higher in life sciences. Given the high focus on innovation in the industry, corporate espionage can result in devastating financial and reputational...more
This is the second article in our two-part series on Cybersecurity in the Age of Industry 4.0, focusing on the legal implications and potential liabilities manufacturers face from cyberattacks, as well as practical...more
Multi-jurisdictional civil fraud matters often present multiple challenges that make the tracing and recovery of assets a complex, costly, and time-consuming investigative process. Making a fraud victim whole again requires...more
Is theft of trade secrets a crime in Arkansas? Yes. Under Arkansas Code Annotated Section 5-36-107, the Arkansas Penal Code establishes that theft of trade secrets is a Class A misdemeanor. The statute establishes that a...more
It is often said that the best defense is a good offense. That is certainly true if you are an employer conducting a risk assessment of potential employee defections that could expose your company to losses of valuable...more
In this hot labor market, businesses have been laser focused on hiring and retaining talent. While increased employee mobility leads to some exciting hires, it also means some workers are leaving for new opportunities. When...more
Presented below is our summary of significant Internal Revenue Service (IRS) guidance and relevant tax matters for the week of November 29, 2021 – December 3, 2021... November 29, 2021: The IRS published a news release...more
Federal authorities have recently described the threat of economic espionage from foreign entities as one of the greatest threats to the economic vitality of the United States, and this has led to an increase in...more
Attorneys are well aware of the ways in which corporate clients are increasingly conducting their business and affairs electronically. A business may routinely place orders with trusted vendors via e-mail, rely on the...more
Below please find this week’s OTA & Travel Distribution Update for the week ending April 7, 2017. The recently released European Commission’s report on the hotel industry headlines this week’s Update. - European...more
In 2014, grocers and restaurants continued to be plagued by attacks leading to the theft of credit card information. Among others, Supervalu Inc. and Jimmy John’s both experienced intrusions in 2014, extending the string of...more
Many of us have been focused on cyber-security, especially in the wake of the recent data breaches over the holidays, among other things. Two Maryland Law Enforcement Officers are leveraging the power of social media and the...more
A Massachusetts dermatology practice, Adult & Pediatric Dermatology, P.C. ("APDerm") recently agreed to pay $150,000 to settle potential violations of HIPAA Privacy, Security, and Breach Notification Rules. The settlement was...more
In today’s complex global economy, competition is fierce. For many businesses, trade secrets are their single most important and valuable asset, and strong protection of that asset is paramount. In the same regard, trade...more
On April 3, 2013, the New York Times published an article about commercial databases that contain reports from retail employers about employees who were accused of stealing from their workplaces. Other retailers, for a fee,...more
On February 20, 2013, the White House issued a report outlining a new plan to combat trade secret theft from U.S. businesses. Faced with the escalating theft of U.S. trade secrets and noting “the crucial role of trade...more