We get Privacy for work – Episode 6: The Potential Privacy Risks Inherent to Mergers and Acquisitions
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 243: HIPAA Compliance and Potential Changes with Shannon Lipham of Maynard Nexsen
We get Privacy for work: The Privacy Pitfalls of a Remote Workforce
No Password Required: From AOL to Award-Winning Cuisine to High-Stakes Hacking
Driving Digital Security: The FTC's Safeguards Rule Explained — Moving the Metal: The Auto Finance Podcast
Privacy for Risk Management: Bridge the Business, Technology and Compliance Gaps
Innovation in Compliance: Real-Time Fraud Prevention Strategies for Financial Loss Prevention with Vince Walden
Innovation in Compliance: The Critical Importance of Mobile Application Security: Insights from Subho Halder
Compliance and AI: Using AI for Data Loss Prevention Systems with Vinay Goel
Safeguarding Your Business Data
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Top Healthcare Compliance Priorities for 2025
Business Better Podcast Episode: Bridging Campuses: Legal Insights on Education Industry Consolidation – Privacy and Data Security
Episode 366 -- DOJ Issues Data Security Program Requirements
FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
Why Privacy Matters to Your Business and What's in Store for 2025
Getting Bang for Your Buck: Spend Your 2025 Privacy Budget Wisely
Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025
The Privacy Insider Podcast Episode 10: 2025 Privacy Predictions: Hold My Beer, 2024
No Password Required: Director and Cybersecurity Adviser at KPMG and Rain Culture Authority
According to a recent survey, artificial intelligence gained a significant foothold in corporate legal departments in 2025, where it is being used mostly for contract drafting and review, legal research, and document...more
In a digital age where large volumes of data can be transferred and retained with ease, the Singapore High Court’s recent decision in Hayate Partners Pte Ltd v Rajan Sunil Kumar [2025] SGHC 41 sheds light on a growing...more
As legal and business professionals focused on protecting intellectual property—especially those of us in business litigation—it's crucial to stay attuned to the expanding influence of generative AI (“GenAI”). While patents...more
Editor’s Note: There’s much conversation around how our industry should best use generative artificial intelligence (gen AI) to do our jobs. On March 19, 2024, HaystackID sponsored an EDRM virtual workshop that explored how...more
The healthcare industry is a major target for cyberattacks because of all of the personal information collected from patients. Recognizing that the healthcare industry is such a ripe hunting ground for cybercriminals, the...more
I’ve written several times during the past year about the importance of information security for legal professionals. Mitigating the threat of unauthorized access to client confidential information is one of the most...more
Massachusetts-Based Background Check Company Creative Services Faces Multiple Lawsuits Over Data Breach - "'CSI determined that certain files dating from November 2018 to November 2021 may have been copied from their...more
What is insider risk? Managing and minimising risk in your organisation starts with understanding the types of risks in the modern workplace. Some risks are driven by external events and factors that are outside of direct...more
Editor’s Note: On March 17, 2021, HaystackID shared an educational webcast designed to inform and update legal and data discovery professionals on how organizations are preparing and responding to increasing security and...more
Cannabis businesses have cyber security and privacy risks. While the risks are varied, many arise from the businesses’ holding of highly sensitive consumer information or confidential data about business partners. Cannabis...more
Cybersecurity was undoubtably on the forefront of the agenda for many organizations in 2020 – and 2021 should be no different. The rapid shift to remote work over the past year has led to an increased number of cybersecurity...more
2020 AG Elections- Ten AG elections were held on November 3, 2020. As of this writing, six incumbent AGs won their elections, and Republicans held the open-seats in Indiana and Montana. In the two undecided races, Democratic...more
As a result of the COVID-19 pandemic, millions of Americans have deserted the physical workplace. Modern technology and remote access capabilities have made it possible to transform almost any job to a telework position. As...more
HOW DID WE GET HERE? Business leaders are grappling with challenges which are unprecedented and which have not been witnessed on such a global scale previously. As COVID-19 spreads across the world, governments reacted by...more
Cybercriminals love a crisis and COVID-19 is no different. In the last several weeks, cyber-crime has increased exponentially as hackers seek to take advantage of the migration to a remote workplace. As cybercriminals seek to...more
The Ponemon Institute recently issued its 2020 Cost of insider Threats Global Report, which finds that the frequency and cost of insider threats is continued to increase. Sponsored by ObserveIT and IBM, the 2020 report is the...more
The bad news first. An estimated 3.5 million cybersecurity positions will be unfilled globally by 2021.* Leaving data security entirely up to the professionals isn’t a viable option. Like it or not we’re all on the...more
New law in New York State extends requirements on companies doing business with New York residents to have cybersecurity programs and expands New York’s breach notification requirements. New law extends the reach of New...more
Effective November 2, 2018, companies that suffer a breach may have certain defenses in Ohio if they have a written cybersecurity program in place. Under this new law, companies can use as an affirmative defense the existence...more
The FBI is warning banks to be on guard against possible attacks on ATMs. In an alert sent to banks on August 10th, the FBI warned banks that it had “obtained unspecified reporting indicating cyber criminals are planning...more
Twenty-five years ago most companies’ greatest fear of espionage was employee theft at the photocopy machine at 2 in the morning. The company playbook could not be forwarded in an email or put on a thumb drive in a matter of...more
In a recent formal Ethics Opinion, the American Bar Association stressed that lawyers must make reasonable efforts to prevent inadvertent or unauthorized access to confidential information relating to the representation of...more
This article summarizes some of the many risks and implications that are associated with failing to comply with U.S. government-unique cyber and information technology requirements. We are often asked by small and...more
In a case of “cyber meets securities fraud,” the United States Attorney’s Office for the Southern District of New York (“SDNY”) recently indicted three foreign nationals on charges of insider trading, wire fraud, and computer...more
Last Friday, Snapchat (which recently changed its name to Snap, Inc.) announced the coming release of its newest product: “Spectacles” - brightly colored, fun-looking sunglasses with a built-in camera that records videos in...more