Current Regulatory, Legislative, and Litigation Developments on ADA Website Accessibility for Consumer Finance Digital Platforms — The Consumer Finance Podcast
Innovation in Compliance: The Critical Importance of Mobile Application Security: Insights from Subho Halder
Ad Law Tool Kit Show – Episode 10 – Website Accessibility
Podcast - Navigating the TikTok Ban: Implications for Government Contractors
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Medical Device Legal News with Sam Bernstein: Episode 10
From an Artistic Eye to AI, Building Bristles into a Buzzworthy Company with Tina Tang
AI: Impact and Use in the Financial Services Industry – Crossover Episode with Regulatory Oversight Podcast - The Consumer Finance Podcast
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Advertising: ADA Compliance related to Websites and Mobile Applications
CF on Cyber: An Update on the Florida Security of Communications Act (FSCA)
Cheryl Curbeam on Creating a Compliance App
The Federal Gift Rules Assistant: What You Need to Know and Why
Nota Bene Episode 98: The U.S. Supreme Court’s Mark on U.S. Antitrust Law for 2020 with Thomas Dillickrath and Bevin Newman
#WorkforceWednesday: Mobile Tracking Technologies, Added PPP Flexibility, Return-to-Work Plans - Employment Law This Week®
Relaxed HIPAA Restrictions For Providers Using Telehealth
The Next Frontier: Legal and Practical Issues That Surround Mobile Gaming
Life Sciences Quarterly (Q4 2017): The Use of Social Media and Mobile Applications
Health Tech Podcast - Episode 2: Best Practices for Health App Development
BakerHostetler Partner Alan Friel Talks Big Data and Data Collection
Legal Considerations for Web-Based Start-Ups
WhatsApp users should update the application for vulnerability CVE-2025-30401, which Meta recently patched when WhatsApp was released for Windows version 2.2450.6....more
In a critical revelation within the realm of digital privacy, a significant data breach was uncovered involving key players in the dating app industry. Approximately 1.5 million explicit images from users of BDSM People,...more
Last week, we explored a recent data breach class action and the litigation risk of such lawsuits. Companies need to be aware of litigation risk not only arising from data breaches, but also from shareholder class actions...more
FBI Warns of Retaliatory Cyber-Attack from Iran - The Federal Bureau of Investigation (FBI) is warning of a heightened likelihood of Iranian cyber-attacks following the escalation of tension between the U.S. and Iran. This...more
Although Amazon and Google respond to reports of vulnerabilities in popular home smart assistants Alexa and Google Home, hackers continually work hard to exploit any vulnerabilities in order to listen to users’ every word to...more
The Federal Bureau of Investigations Internet Crime Complaint Center (IC3) recently issued a public service announcement warning private companies about the increasing numbers of ransomware attacks affecting private industry....more
WhatsApp, the popular instant messaging app announced a hack and the exposure of a security flaw this week. The flaw injected malware onto users’ phones, potentially exposing their otherwise encrypted data and messages. ...more
Recently, the Federal Bureau of Investigation (FBI) issued a warning t U.S. consumers that Russian hackers (dubbed Sofacy and a/k/a Fancy Brear and APT28, and believed to be backed by the Russian government) had compromised...more
Apple has pushed an update to iOS 11.2 to its users. Users should consider pushing any updates that are recommended by the manufacturer, as there is usually a reason behind the update, and many times it is to fix a...more
The American Institute of CPAs (AICPA), has released a risk management reporting framework intended to "establish a common, underlying language for Cybersecurity risk management reporting — almost akin to US GAAP or IFRS...more
According to a study by Softchoice, 1-in-5 employees still keep their passwords in plain sight (like a Post-it Note on their desk or in the top drawer of their desk—now that’s original), have accessed work files from a device...more