Compliance Tip of the Day: Rethinking Corporate AI Governance Through Design Intelligence
Maryland's Sales Tax on IT and Data Services
Sunday Book Review: July 20, 2025, The Best Books on Business Edition
(Podcast) The Briefing: Anthropic, Copyright, and the Fair Use Divide
The Briefing: Anthropic, Copyright, and the Fair Use Divide
SkadBytes Podcast | Tech’s Shifting Landscape: Five Trends Shaping the Conversation
No Password Required: From AOL to Award-Winning Cuisine to High-Stakes Hacking
The Authenticity Advantage: How Runbin Dong’s Scale Social AI Helps Small Businesses Shine
#Risk New York Speaker Series – Bridging the Gap: Effective Risk Communication in Compliance with Rob Clark, Jr.
Hsu Untied interview with Brad Waugh, General Counsel at TP-Link
Risk New York Speaker Series: AI Investments and Political Uncertainty with Chris Mason
#Risk New York Speaker Series: Exploring AI Risks in Compliance with Gwen Hassan
Unexpected Paths to IP Law with Dan Young and Colin White
Compliance Needs are Alive and Well: FTC's Recent Enforcement Activity
Innovation in Compliance: The Critical Importance of Mobile Application Security: Insights from Subho Halder
The LathamTECH Podcast — Getting Deals Done: Tackling Antitrust Challenges in Tech M&A
Compliance into the Weeds: Autonomous AI Whistleblowing Misconduct
Daily Compliance News: June 4, 2025, The Climate Disaster Management Edition
The Future of Supply Chains: Chris Andrassy on Using AI to Predict & Prevent Disruptions
Daily Compliance News: June 2, 2025, The Unintended Consequence Edition
Coworker.ai has recently announced the launch of the world’s first AI “teammate,” an agent that can perform complex work at the level of an experienced colleague. Powered by Organizational Memory (OM1), a proprietary memory...more
The European Union Agency for Cybersecurity (ENISA) has launched the European Vulnerability Database (EUVD), a tool designed to enhance digital security across the EU. The EUVD is available here....more
Technology vendors everywhere want to serve big Wall Street banks, so when one of those banks talks about risks they see in their software supply chain, compliance and audit professionals should listen – which brings us to an...more
Federal contractors, including defense contractors, should prepare for the emergence of new requirements in the coming months that are designed to strengthen software supply chain security, impose more stringent cybersecurity...more
On this special edition of Ropes & Gray’s Alumni @ RopesTalk podcast series, technology and IP transactions partner Regina Sam Penti is joined by Dr. Vasanth Sarathy, a professor of computer science at Tufts University and a...more
The European Union has significantly overhauled its product liability regime with a new directive concerning liability for defective products (Product Liability Directive). EU member states have until December 9, 2026, to...more
In a win for policyholders, a federal court in Washington recently held that an insurer had a duty to defend a technology company against a vendor’s demand for damages it allegedly suffered when hackers accessed software...more
The Cybersecurity and Infrastructure Security Agency (CISA) unveiled new cyber performance goals aimed at addressing risks to software development and product design in the IT sector. Last week, the Cybersecurity and...more
The EU Cyber Resilience Act (CRA) entered into force on 10 December 2024. The CRA is the first legislation of its kind in the world that aims to enhance the cyber security of products or software with a digital component...more
U.S. investors interested in investing in advanced Chinese technology companies may now be constrained by the U.S. Government’s first-ever outbound investment rule (Final Rule) which took effect on Jan. 2, 2025. The Final...more
Happy Holidays and welcome to our year-end issue of Decoded. We hope you enjoyed reading our technology law insights e-newsletter this year. We are already planning for 2025. ...more
Editor’s Note: Read the transcript from HaystackID’s webcast, “From Mac to Mobile: Advanced Data Triage and Collection Tools for Forensic Investigators,” to learn about HaystackID’s Remote Endpoint Analysis and Data...more
Editor’s Note: During a recent HaystackID webcast, expert panelists explored the role of the Committee on Foreign Investment in the United States (CFIUS) in protecting sensitive technologies, classified contracts, and other...more
As an onslaught of recent class actions allege, companies may be liable for eavesdropping and wiretapping based on the use of common analytics software on their platforms. For instance, in California, plaintiffs have filed...more
Ask any long-time HR professional what the most significant change of the last few years has been, and they’ll all tell you the same things: the use of HR technology and the investment in human capital. The two are...more
On October 3, 2023, the FAR Council released two long-awaited proposed rules for federal contractor cybersecurity stemming from the Biden Administration’s Cybersecurity Executive Order from May 2021 (Executive Order 14028)....more
Artificial intelligence promises to transform the way we live and work and its impact will undoubtedly stretch to every business sector across the globe. This next generation of technology brings exciting possibilities and...more
In an era where our lives are ever more intertwined with technology, the security of digital platforms is a matter of national concern. A recent large-scale cyberattack affecting several U.S. federal agencies and numerous...more
Editor’s Note: We are excited to announce that this article is the first of a series addressing Software as a Medical Device and the issues that plague digital health companies, investors, clinicians and other organizations...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you if its product is compromised and results in a data...more
On September 15, 2022, the European Commission (EC) published a Proposal for a Cyber Resilience Act (CRA Proposal) that sets out new rules in the European Union (EU) for software and hardware products and their remote data...more
Quantum computing has the potential to drive economic growth and promote innovation across a range of industries such as manufacturing, supply chain optimization and logistics, molecular simulations and pharmaceuticals,...more
Consumer software providers will soon have the option to label their software as compliant with National Institute of Standards and Technology (NIST) standards for software security. On November 1, 2021, NIST published its...more
Internet of Things (IoT) devices have the potential to transform our home and work environment by integrating a growing range of “smart” wirelessly connected sensors into our daily lives. Recognizing the growing importance of...more