We get Privacy for work — Episode 8: The Surge in Data Breach Lawsuits: Trends and Tactics
The Privacy Insider Podcast Episode 17: Security, Cyber-Intel, and a Sense of Humor with Nir Rothenberg of Rapyd
We get Privacy for work — Episode 7: What Is a WISP and Why Your Organization Must Have One
Under the Radar: DOJ's Data Security Rules and Their Impact on Payments Companies — Payments Pros – The Payments Law Podcast
No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats
We get Privacy for work – Episode 6: The Potential Privacy Risks Inherent to Mergers and Acquisitions
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 243: HIPAA Compliance and Potential Changes with Shannon Lipham of Maynard Nexsen
We get Privacy for work: The Privacy Pitfalls of a Remote Workforce
No Password Required: From AOL to Award-Winning Cuisine to High-Stakes Hacking
Driving Digital Security: The FTC's Safeguards Rule Explained — Moving the Metal: The Auto Finance Podcast
Privacy for Risk Management: Bridge the Business, Technology and Compliance Gaps
Innovation in Compliance: Real-Time Fraud Prevention Strategies for Financial Loss Prevention with Vince Walden
Innovation in Compliance: The Critical Importance of Mobile Application Security: Insights from Subho Halder
Compliance and AI: Using AI for Data Loss Prevention Systems with Vinay Goel
Safeguarding Your Business Data
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Top Healthcare Compliance Priorities for 2025
Business Better Podcast Episode: Bridging Campuses: Legal Insights on Education Industry Consolidation – Privacy and Data Security
Episode 366 -- DOJ Issues Data Security Program Requirements
FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
On June 30, 2025, Governor Mike DeWine signed into law (HB 96), a cybersecurity mandate that applies to all political subdivisions in Ohio—including counties, municipalities, townships, and school districts. ...more
In the high-stakes world of legal due diligence, the security and confidentiality of sensitive information are paramount. With the increasing volume of electronically stored information (ESI) and the complexity of modern...more
Be cautious, be curious, be vigilant, and be brave. Those were the words of the New York State Bar Association’s Task Force on Artificial Intelligence. It is good advice. GenAI is here and lawyers need to understand its...more
The American Bar Association (“ABA”) recently issued Formal Opinion 512, providing essential guidance for lawyers and law firms using Generative AI (“GAI”) tools. As we have written about previously, when lawyers employ GAI...more
When someone violates the secrecy of a company’s trade secrets, what can the company do about it? Writing a sternly worded cease and desist letter is often a good first step that we recommend to clients, however it must be...more
Artificial intelligence promises to transform the way we live and work and its impact will undoubtedly stretch to every business sector across the globe. This next generation of technology brings exciting possibilities and...more
For better or worse, generative artificial intelligence (AI) is already transforming the way we live and work. Within two months of its initial release to the public, ChatGPT reached 100 million monthly active users, making...more
While many types of AI have existed in some form for several years, the new generation of sophisticated AI solutions, especially generative AI (“GenAI”), has driven a rise in AI use cases, including tools to create and debug...more
Generative Artificial Intelligence (AI) is already transforming the way we live and work. Within two months of its initial release to the public, ChatGPT reached 100 million monthly active users, making it the fastest-growing...more
What is insider risk? Managing and minimising risk in your organisation starts with understanding the types of risks in the modern workplace. Some risks are driven by external events and factors that are outside of direct...more
In the past decade, the prevalence of videoconferencing, social media, and other technological platforms have flooded college dorm rooms and boardroom meetings alike. The ubiquity of these technologies is unavoidable, and...more
Why does this topic matter to organisations? Under the GDPR, the concept of a "processor" has not changed. Any entity that was a processor under the Directive likely continues to be a processor under the GDPR. However,...more
In a recent formal Ethics Opinion, the American Bar Association stressed that lawyers must make reasonable efforts to prevent inadvertent or unauthorized access to confidential information relating to the representation of...more
On January 13, 2017, SAMHSA issued a Final Rule updating the Confidentiality of Alcohol and Drug Abuse Patient Records regulations (42 C.F.R. Part 2). SAMHSA also issued a Supplemental Proposed Rule requesting comments on...more
On January 18, 2017, the U.S. Department of Health and Human Services, Substance Abuse and Mental Health Services Administration (SAMHSA) released a final rule (the Final Rule) modifying the federal regulations governing the...more
THE NIGHTMARE SCENARIO - Within the span of two weeks, Mr. Smith and Mr. Wilson, two top managers from your $2 billion corporation, resign. Both managers had complete, unfettered access to your corporation’s trade...more
Tennessee has joined other states in formally approving lawyers’ cloud-storage of client-confidential data. The Board of Professional Responsibility (“BOPR”) held that lawyers ethically may use cloud storage for...more