Moving Beyond the Usual Helpline Data
Compliance Tip of the Day: Why Engage in Pre-acquisition Due Diligence
Innovation in Compliance: Operationalizing Trust at Scale: A Conversation with Amanda Carty on Compliance and AI
AI Today in 5: August 7, 2025. The US v. China Episode
Hill Country Authors – Exploring the Challenges of a Green Transition with Tom Ortiz
Taxing Intelligence: AI's Role in Modern Tax Administration
LathamTECH in Focus: Move Fast, Stay Compliant
AI Today in 5: August 6, 2025, The Rethinking Compliance Episode
Daily Compliance News: August 6, 2025, The Spanking Banks Edition
AI Today in 5: August 5, 2025, The AI at the SEC Episode
Compliance Tip of the Day: M&A – International Issues
From Forest to Fortune: Navigating Workplace Ethics With Robin Hood — Hiring to Firing Podcast
Under the Radar: DOJ's Data Security Rules and Their Impact on Payments Companies — Payments Pros – The Payments Law Podcast
Adventures in Compliance: The Novels - The Valley of Fear, Introduction and Compliance Lessons Learned
Episode 381 -- NAVEX's 2025 Annual Hotline Report
12 O’Clock High, a podcast on business leadership: Building Trust and Relationships: The Power of Compliance and Ethics with Jacqui Pruet
Data Driven Compliance: Understanding the ECCTA and Its Impact on Fraud Prevention with Vince Walden
Daily Compliance News: August 1, 2025, The All AI Edition
AI and the False Claims Act
Compliance Tip of the Day: AI, Continuous Monitoring and Compliance
The European Commission has published the long-awaited guidelines clarifying how online platforms such as social media platforms, online marketplaces, app stores and other content-sharing services should protect minors under...more
In the thirty-first episode of EDRM Trusted Partner, HaystackID’s monthly podcast series, Jeff Fleming, Managing Director for our wonderful Trusted Partner, HaystackID sits down with Kaylee & Mary to talk about his journey...more
Cyber, Privacy, and Technology Report - Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed....more
The UK’s Online Safety Act 2023 (OSA) is a comprehensive piece of legislation designed to regulate social media companies and search services and to increase protections for individuals online. It draws comparisons to the...more
It is hard to believe that another year is upon us! As we have done in years past (including 2023, 2022, 2021, 2020, 2019 and 2018), we have created a comprehensive resource of all our www.eyeonprivacy.com posts from 2024. As...more
Character Technologies, Inc. faces allegations in a Texas lawsuit that its chatbot, Character.AI, encouraged self-harm, violent behavior, and provided sexually inappropriate sexual content to minors. The civil lawsuit...more
Remote worker fraud is expected to continue to proliferate in 2025. Fully remote hiring and work, particularly in the technology sector, continues to pose unique business and legal risks for companies. Just in December 2024,...more
China’s ByteDance, the parent company of TikTok, is seeking USD1.1 million in damages from a former intern accused of sabotaging its artificial intelligence (AI) large language model training infrastructure....more
The past few years have seen a sharp increase in the use of artificial intelligence (AI) across a variety of industries and workplaces. Many businesses have implemented AI to help streamline the recruitment and hiring process...more
Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
This week, in addition to the news-catching, ongoing dispute between Twitter and Elon Musk, Twitter’s former head of cybersecurity, Peiter Zatko, claimed in a whistleblower filing with several federal agencies that Twitter...more
The Cybersecurity and Infrastructure Security Agency (CISA) recently issued guidance on protecting the security of organizations’ social media accounts to reduce the risk of unauthorized access to those accounts....more
Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirement, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more
Following the escalation of tensions between the United States and Iran in the past week, the Health Information Sharing and Analysis Center (H-ISAC) is warning hospitals and health systems that Iran could attack health...more
With 2018 in the archives, Hanzo is starting off the new year with a look ahead to the trends and challenges we believe will define the compliance and eDiscovery landscape in 2019, and a look back at the year that was at...more
When it comes to digital threats, universities must protect not only a broad and deeply layered infrastructure, but also vast populations of students. In this episode, Elisa D’Amico and Desiree Moore outline their top five...more
Today’s world demands a multifaceted approach to digital content that can negatively affect your business. In this episode, we outline the five key steps to take in the face of a digital crisis, from defining what constitutes...more
For many companies, customer information ranks among its most important assets. Yet these days, employees often keep this sensitive customer information in electronic locations that are not readily accessible to or controlled...more
I have the privilege of teaching Privacy Law at Roger Williams University School of Law, one of the few law schools in the country to offer the course. This is the fourth year the course has been offered, and the students who...more
Protecting your digital assets is as important as protecting your physical assets. Never think, “It won’t happen to me”—everyone has something that cyber criminals can steal. Stay secure by following a few basic guidelines....more