Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 243: HIPAA Compliance and Potential Changes with Shannon Lipham of Maynard Nexsen
We get Privacy for work: The Privacy Pitfalls of a Remote Workforce
No Password Required: From AOL to Award-Winning Cuisine to High-Stakes Hacking
Driving Digital Security: The FTC's Safeguards Rule Explained — Moving the Metal: The Auto Finance Podcast
Privacy for Risk Management: Bridge the Business, Technology and Compliance Gaps
Innovation in Compliance: Real-Time Fraud Prevention Strategies for Financial Loss Prevention with Vince Walden
Innovation in Compliance: The Critical Importance of Mobile Application Security: Insights from Subho Halder
Compliance and AI: Using AI for Data Loss Prevention Systems with Vinay Goel
Safeguarding Your Business Data
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Top Healthcare Compliance Priorities for 2025
Business Better Podcast Episode: Bridging Campuses: Legal Insights on Education Industry Consolidation – Privacy and Data Security
Episode 366 -- DOJ Issues Data Security Program Requirements
FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
Why Privacy Matters to Your Business and What's in Store for 2025
Getting Bang for Your Buck: Spend Your 2025 Privacy Budget Wisely
Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025
The Privacy Insider Podcast Episode 10: 2025 Privacy Predictions: Hold My Beer, 2024
No Password Required: Director and Cybersecurity Adviser at KPMG and Rain Culture Authority
Protect, Prepare, Prevail: Navigating a Complex Cybersecurity World
Large Language Models (LLMs) are a type of Artificial Intelligence (AI) system that can process and generate human-like text based on the patterns and relationships learned from vast amounts of text data. LLMs use a machine...more
The advent of generative artificial intelligence has given rise to a debate about how this innovative technology will affect intellectual property rights and trade secret protections in particular....more
As recent innovations in automotive technology continue to fuel unprecedented growth across the industry, companies must adapt their privacy and confidentiality capabilities to safeguard highly valuable trade secrets. With...more
As legal and business professionals focused on protecting intellectual property—especially those of us in business litigation—it's crucial to stay attuned to the expanding influence of generative AI (“GenAI”). While patents...more
Imagine getting your hands on the ultimate creator cheat code — the behind-the-scenes playbook MrBeast uses to dominate YouTube. Now imagine going viral not for using it, but for allegedly walking off with it. That’s exactly...more
Protecting trade secrets in any business is critical, but the stakes are higher in life sciences. Given the high focus on innovation in the industry, corporate espionage can result in devastating financial and reputational...more
AT A GLANCE - Beyond whether DeepSeek used data from existing AI application program interfaces (APIs) to train its models lie concerns about whether querying an AI API may lead to trade secret misappropriation....more
Trade secrets have become a de facto intellectual property right for securing valuable artificial intelligence information. Despite regulatory trends toward greater transparency of AI models, federal policy acknowledges,...more
Join Us for Protecting Trade Secrets & Gaining a Competitive Edge in the Digital Age - Sophisticated Strategies to Protect Critical Assets When Key Employees Depart & Business Relationships Break Down - The protection...more
Cybersecurity was undoubtably on the forefront of the agenda for many organizations in 2020 – and 2021 should be no different. The rapid shift to remote work over the past year has led to an increased number of cybersecurity...more
In the past decade, the prevalence of videoconferencing, social media, and other technological platforms have flooded college dorm rooms and boardroom meetings alike. The ubiquity of these technologies is unavoidable, and...more
The COVID-19 remote work era is now in its tenth month, and employees continue to work away from the physical office, without in-person supervision, and perhaps outside of the company network. During this time, many employees...more
In late 2019, it was reported by Infosecurity Magazine that 72% of former employees admitted taking company data with them upon departure. Determining what actions a former employee took on a company device leading up to...more
On April 16, 2020, the White House issued its “Guidelines for Opening Up America Again,” and several states have begun a slow process of emerging from the shutdown....more
One of the first things a company should do when it suspects that its trade secrets have been compromised or that an employee has violated post-employment restrictive covenants is to conduct an investigation. ...more
Social media contact lists have become an increasingly important part of a business’s customer lists. While courts are still grappling with who legally “owns” the data that the employee acquired on the employer’s dime—such...more
Employers continuously face a key employee or consultant leaving or separating from the company to join or start a competing business. In these inevitable scenarios, the loss – potential or actual – of the company's...more
A Tennessee District Court recently ruled in Wachter Inc. v. Cabling Innovations, LLC, 3:18-cv-00488 (W.D. Tenn. May 7, 2019) that two former employees with permitted access to company computers were not liable under the...more
A district court in Tennessee recently concluded in Wachter Inc. v. Cabling Innovations LLC that two former employees who allegedly shared confidential company information found on the company’s computer system with a...more
It’s among an in-house counsel’s worst nightmares. A former business partner, ex-employee, consultant, or competitor has stolen your company’s trade secret information. Company management demands swift action....more
A federal court of appeals recently found that there was nothing wrong with a company monitoring a departed employee’s Facebook account and using that information to pursue a trade secrets claim against four former employees....more
In a recent case involving hackers that stole "payment card data" from Chipotle, Judge William J. Martinez in the United States District Court for the District of Colorado found on an issue of first impression that payment...more
Most companies have strengthened their cybersecurity defenses against outside hackers, but many often neglect the equal threat posed by those within their network walls — employees who already have privileged access to...more
Waking up to news of another major data breach seems to have become a daily routine. On the front pages and cable news, we hear about hackers, rogue governments, and shadowy figures involved with these data breaches. But too...more
Recently, the United States Court of Appeals for the Eleventh Circuit, sitting in Miami, heard oral argument in the case of LabMD, Inc. v. Federal Trade Commission, No. 16-16270. ...more