Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 243: HIPAA Compliance and Potential Changes with Shannon Lipham of Maynard Nexsen
We get Privacy for work: The Privacy Pitfalls of a Remote Workforce
No Password Required: From AOL to Award-Winning Cuisine to High-Stakes Hacking
Driving Digital Security: The FTC's Safeguards Rule Explained — Moving the Metal: The Auto Finance Podcast
Privacy for Risk Management: Bridge the Business, Technology and Compliance Gaps
Innovation in Compliance: Real-Time Fraud Prevention Strategies for Financial Loss Prevention with Vince Walden
Innovation in Compliance: The Critical Importance of Mobile Application Security: Insights from Subho Halder
Compliance and AI: Using AI for Data Loss Prevention Systems with Vinay Goel
Safeguarding Your Business Data
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Top Healthcare Compliance Priorities for 2025
Business Better Podcast Episode: Bridging Campuses: Legal Insights on Education Industry Consolidation – Privacy and Data Security
Episode 366 -- DOJ Issues Data Security Program Requirements
FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
Why Privacy Matters to Your Business and What's in Store for 2025
Getting Bang for Your Buck: Spend Your 2025 Privacy Budget Wisely
Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025
The Privacy Insider Podcast Episode 10: 2025 Privacy Predictions: Hold My Beer, 2024
No Password Required: Director and Cybersecurity Adviser at KPMG and Rain Culture Authority
Protect, Prepare, Prevail: Navigating a Complex Cybersecurity World
Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed. State Action: Texas Limits Punitive Damage Liability For Data Security Breach...more
Working on the go has become a necessity for many, but it should never come at the expense of confidentiality. Julie Savarino explains....more
In today’s hybrid and remote work environment, organizations are increasingly turning to digital employee management platforms that promise productivity insights, compliance enforcement, and even behavioral analytics. These...more
M&A in the AI sector is redefining deal risk, especially when sensitive data is involved. As AI companies power breakthroughs in biotech, healthcare, defense, and critical infrastructure, the stakes for companies acquiring...more
Encryption is one of several cornerstones of a robust information security program. Articles on quantum computing often include the compelling narrative that encryption is at risk, but as with any revolutionary technology,...more
Welcome to your monthly legal insights on the trends impacting the Retail, Hospitality, and Food & Beverage Industries. ...more
It is hard to believe that we are starting the 25th year of the 21st century. The rapid evolution that technology, privacy and data security have undergone these last 25 years is mindbending. Yet, as we enter 2025, it still...more
Artificial intelligence or AI—yes, we are talking about it again. The explosion of AI in healthcare will only continue to grow. Statistics show that the total market value of AI in healthcare will expand to over $148 billion...more
Gradually, data is being recognized as an asset in an increasingly data-hungry healthcare industry. In the tenth episode of Sheppard Mullin’s Health-e Law Podcast, Arti Bedi Pullins, President and Chief Healthcare Officer at...more
Artificial intelligence is going to transform how the world does business — and in order to harness that transformation for the better, businesses need to be proactive about mitigating risks. When it comes to managing AI risk...more
The chair of the U.S. Senate Committee on Commerce, Science, and Transportation, Maria Cantwell (D-WA), and the chair of the U.S. House Committee on Energy and Commerce, Cathy McMorris Rodgers (R-WA), released a discussion...more
This is the second post in a two-part series on PrivacyCon’s key-takeaways for healthcare organizations. The first post focused on healthcare privacy issues. This post focuses on insights and considerations relating to the...more
The Change Healthcare ransomware attack presents potentially significant ramifications for hospitals, health systems, pharmacies and others that rely on the organization’s tools for healthcare payment, revenue cycle...more
The Current Status of Privacy Laws Across the United States - Unlike the General Data Protection Regulation (GDPR) in the European Union (EU), the United States does not have a nationwide comprehensive data privacy law....more
The Federal Trade Commission (FTC) gave privacy lawyers a long-awaited Christmas gift on December 20, 2023: its notice of proposed rulemaking (NPRM) to amend the Children’s Online Privacy Protection Act (COPPA) Rule. The NPRM...more
On October 30, 2023, the White House released a long-awaited Executive Order (EO) on the “Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence.” The EO acknowledges the transformative potential of AI...more
Following the European Council's approval last week, the Digital Services Act (DSA) has been officially adopted, starting the countdown to the law’s entry into force later this year. The DSA builds on the Electronic Commerce...more
As data privacy regulations have become increasingly commonplace in the last decade, organizations have had to strategically assess how they collect, process, store, and sell consumer data. To better equip themselves for this...more
China’s internet watchdog, the Cyberspace Administration of China (CAC), has continued to tighten its regulation of internet industries and driven the formulation of many new laws and regulations in cybersecurity and data...more
The U.S. Federal Communications Commission (FCC) published a Notice of Inquiry (NOI) on February 28, 2022, inviting public comment on vulnerabilities that threaten the security and integrity of the Border Gateway Protocol...more
In recent years, the Federal Communications Commission (FCC) has worked closely with the U.S. Department of Justice (DOJ) and other executive branch national security agencies to restrict China’s influence on U.S....more
Purpose - Distributed ledger technology (“DLT”), including the use of blockchain technology, has been touted as a way to create and validate digital identities that serve many of the same purposes that physical forms of...more
What is the Internet of Things? The 'Internet of Things' (IoT) is a catchphrase describing the increasing interconnectedness between smart devices and sensors facilitated through their connection to the internet. It's not a...more
Security experts at the University of Washington in Seattle recently set out to expose potential privacy and security vulnerabilities that exist in telesurgery. As first reported by MIT Technology Review, experts hacked a...more