We get Privacy for work — Episode 8: The Surge in Data Breach Lawsuits: Trends and Tactics
The Privacy Insider Podcast Episode 17: Security, Cyber-Intel, and a Sense of Humor with Nir Rothenberg of Rapyd
We get Privacy for work — Episode 7: What Is a WISP and Why Your Organization Must Have One
Under the Radar: DOJ's Data Security Rules and Their Impact on Payments Companies — Payments Pros – The Payments Law Podcast
No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats
We get Privacy for work – Episode 6: The Potential Privacy Risks Inherent to Mergers and Acquisitions
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 243: HIPAA Compliance and Potential Changes with Shannon Lipham of Maynard Nexsen
We get Privacy for work: The Privacy Pitfalls of a Remote Workforce
No Password Required: From AOL to Award-Winning Cuisine to High-Stakes Hacking
Driving Digital Security: The FTC's Safeguards Rule Explained — Moving the Metal: The Auto Finance Podcast
Privacy for Risk Management: Bridge the Business, Technology and Compliance Gaps
Innovation in Compliance: Real-Time Fraud Prevention Strategies for Financial Loss Prevention with Vince Walden
Innovation in Compliance: The Critical Importance of Mobile Application Security: Insights from Subho Halder
Compliance and AI: Using AI for Data Loss Prevention Systems with Vinay Goel
Safeguarding Your Business Data
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Top Healthcare Compliance Priorities for 2025
Business Better Podcast Episode: Bridging Campuses: Legal Insights on Education Industry Consolidation – Privacy and Data Security
Episode 366 -- DOJ Issues Data Security Program Requirements
FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
Maybe you've noticed unusual patterns in lost business, or perhaps another employee tipped you off about the theft. Whatever the warning signs, you need to act quickly and strategically. Here's your step-by-step guide to...more
While external cyber threats make headlines, the reality is that your biggest risk often comes from within. For North Carolina businesses, from tech startups in Durham to manufacturers in Greensboro, understanding how to...more
The advent of generative artificial intelligence has given rise to a debate about how this innovative technology will affect intellectual property rights and trade secret protections in particular....more
As recent innovations in automotive technology continue to fuel unprecedented growth across the industry, companies must adapt their privacy and confidentiality capabilities to safeguard highly valuable trade secrets. With...more
In this week's episode of OK at Work, attorneys Sarah Sawyer and Russell Berger from Offit Kurman discuss the importance of protecting sensitive business information such as client lists and proprietary data. Using the...more
The number one risk for trade secrets exfiltration is from insider threats—employees, contractors, or even executives with access to sensitive information who either intentionally or accidentally compromise it. Sometimes it’s...more
As legal and business professionals focused on protecting intellectual property—especially those of us in business litigation—it's crucial to stay attuned to the expanding influence of generative AI (“GenAI”). While patents...more
Imagine getting your hands on the ultimate creator cheat code — the behind-the-scenes playbook MrBeast uses to dominate YouTube. Now imagine going viral not for using it, but for allegedly walking off with it. That’s exactly...more
Spring has arrived, and in addition to cleaning, it’s a good time to reassess how your company is handling its trade secrets. Far from being static, trade secret innovations, processes, and data evolve over time. Business...more
Recent developments in workplace dynamics, regulatory changes, and several high-profile cases have highlighted the growing importance of understanding and protecting your company's trade secrets. For in-house counsel, staying...more
Insider threats continue to present a significant challenge for organizations of all sizes. One particularly concerning scenario involves employees who leave an organization and impermissibly take or download sensitive...more
The rapid advancement of generative artificial intelligence technologies has revolutionized various industries by automating complex tasks, creating content, and enhancing decision-making processes. However, it also poses...more
The construction industry is full of valuable business information including customer lists, pricing information, project budgets, and more. The value of such information may be lost if it becomes known to a competitor or the...more
It is often said that the best defense is a good offense. That is certainly true if you are an employer conducting a risk assessment of potential employee defections that could expose your company to losses of valuable...more
Join Us for Protecting Trade Secrets & Gaining a Competitive Edge in the Digital Age - Sophisticated Strategies to Protect Critical Assets When Key Employees Depart & Business Relationships Break Down - The protection...more
Cybersecurity was undoubtably on the forefront of the agenda for many organizations in 2020 – and 2021 should be no different. The rapid shift to remote work over the past year has led to an increased number of cybersecurity...more
In the past decade, the prevalence of videoconferencing, social media, and other technological platforms have flooded college dorm rooms and boardroom meetings alike. The ubiquity of these technologies is unavoidable, and...more
The COVID-19 remote work era is now in its tenth month, and employees continue to work away from the physical office, without in-person supervision, and perhaps outside of the company network. During this time, many employees...more
Like companies in other industries, a growing number of modern energy-related companies are focusing their efforts on data collection and analysis. For example, Enphase – an energy technology company – regularly tracks data...more
Now entering its ninth month in the United States with no sign of slowing down, the COVID-19 pandemic has forced many employers to make permanent changes to business operations in order to survive. Among the most noticeable...more
On April 16, 2020, the White House issued its “Guidelines for Opening Up America Again,” and several states have begun a slow process of emerging from the shutdown....more
One of the first things a company should do when it suspects that its trade secrets have been compromised or that an employee has violated post-employment restrictive covenants is to conduct an investigation. ...more
A Tennessee District Court recently ruled in Wachter Inc. v. Cabling Innovations, LLC, 3:18-cv-00488 (W.D. Tenn. May 7, 2019) that two former employees with permitted access to company computers were not liable under the...more
It’s among an in-house counsel’s worst nightmares. A former business partner, ex-employee, consultant, or competitor has stolen your company’s trade secret information. Company management demands swift action....more
A federal court of appeals recently found that there was nothing wrong with a company monitoring a departed employee’s Facebook account and using that information to pursue a trade secrets claim against four former employees....more