The Current State of the Holder Rule: Friend or Foe? — Moving the Metal: The Auto Finance Podcast
Non-Compete Compliance in 2025: State Trends and Employer Strategies
FTC and Florida Focus on Non-Competes, SCOTUS to Rule on Pension Withdrawal Liability - #WorkforceWednesday® - Employment Law This Week®
Podcast - Tips for Maintaining FTC Compliance When Using AI
From Banks to FinTech: The Evolution of Small Business Lending — The Consumer Finance Podcast
From Banks to FinTech: The Evolution of Small Business Lending — Payments Pros – The Payments Law Podcast
Driving Digital Security: The FTC's Safeguards Rule Explained — Moving the Metal: The Auto Finance Podcast
First 100 Days of the New HSR Rules with Antitrust Partner Kara Kuritz
Podcast - FTC to Focus on Deceptive AI Claims: Compliance Management Strategies
Cruising Through Change: The Auto-Finance Industry’s New Era Under Trump Unveiled — The Consumer Finance Podcast
Cruising Through Change: The Auto-Finance Industry’s New Era Under Trump Unveiled — Moving the Metal: The Auto Finance Podcast
Compliance Needs are Alive and Well: FTC's Recent Enforcement Activity
Podcast - New Guidance on Complying with FTC Rule on Deceptive and Unfair Fees
Podcast - Navigating the New Landscape of Private Equity in Healthcare
The Briefing: Influencer Fail – ALO Yoga & Influencers Named in $150M Class Action Lawsuit for FTC Violations
From Cell Phones to Tractors: The Right to Repair Movement Drives On — Regulatory Oversight Podcast
Consumer Finance Monitor Podcast Episode: The Impact of the Election on the FTC
Podcast - Who Owns Your DNA? Lessons Learned from 23andMe
2 Gurus Talk Compliance: Episode 51 – The Compliance Week at 20 Edition
Daily Compliance News: May 1, 2025, The 100 Days of Corruption Edition
The cybercrime group known as Scattered Spider is at it again, according to Google’s Threat Intelligence Group. This criminal group is known to focus its cyber attacks on one sector at a time. Last spring, it was the retail...more
It is no secret that ransomware dominates headlines, and cybersecurity incidents have become part of our everyday language. However, the criminal “business model” behind ransomware keeps evolving. Originally published in...more
Cyber, Privacy, and Technology Report - Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed....more
Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed....more
Publications and Advisories - November 13, 2023 – Kathleen Benway, Kate Hanniford, Amy Mushahwar, Kim Peretti, and Lance Taubin published “Privacy, Cyber & Data Strategy Advisory: FTC Approved New Data Breach Notification...more
Publications and Advisories - July 31, 2023 – Dave Brown, Kate Hanniford, Kim Peretti, Julia Mediamolle, Cara Peterman, Sierra Shear, Kristen Bartolotta, and Kezia Osunsade published “Securities Law, Securities Litigation,...more
On April 20, HaystackID shared an educational webcast developed to discuss best practices for handling big data and provide tangible field-experienced methods for data remediation. These best practices can be implemented at...more
SDNY Rejects Standing under “Increased Risk” Theory Where Data Not Targeted or Stolen - The Southern District of New York rejected a settlement that would have resolved a class action based on the unauthorized (and...more
Some forms of cyber extortion are automated and not targeted at any specific victim. For example, “ransomware” refers to a type of malware that prevents users from accessing their systems unless, and until, a ransom is paid. ...more
The recent global ransomware attack (WannaCry) was yet another reminder of the increased threat posed by cyber breaches. While cybersecurity attacks are inevitable, organizations (and their directors and officers) may still...more
The Federal Trade Commission (FTC) announced on May 9, 2017, that it has launched a new website that “helps small businesses avoid scams and cyber-attacks.”...more
There is no such thing as compliance with the NIST Cybersecurity Framework (FTC). In September, the FTC dispelled a commonly held misconception regarding the NIST Framework: It “is not, and isn’t intended to be, a standard or...more
On August 31st and September 7th, 2016, the Federal Trade Commission (FTC) provided guidance regarding cybersecurity standards, which companies should consider when assessing their current data security posture....more