8 Key Takeaways | Strategies to Drive Influence With and Without Authority
Multijurisdictional Employers, P2: 2025 State-by-State Updates on Non-Compete/Non-Solicitation Agts
A Blueprint for Efficient SRRs: Mastering Your Subject Rights Workflow
Podcast - Talking Sickle Cell Trait with NFL Wide Receiver Ty Montgomery and Dr. Anjulika Chawla, MD, FAAP
Meritas Capability Webinar - Legal Cannabis and the Health Care Industry
[WEBINAR] Planning in the Coastal Zone
A Marketing Platform That Matches the Type of Firm - Faegre Baker Daniels + ON24
Webinar: How to Get Your Lawyers Sharing Successfully on LinkedIn - with @AdrianDayton
Starting July 9, 2025, the U.S. Department of Justice will begin enforcing its new “Bulk Sensitive Data Rule,” a sweeping regulation aimed at restricting the transfer and storage of sensitive U.S. personal and...more
Privacy pros are passionate about doing good work, in every sense of the word. Yes, we care about managing privacy as thoroughly and efficiently as possible (and not getting fined). But we are all in this line of work for a...more
Carriers have an obligation to protect customer proprietary network information (CPNI) and personally identifiable information (PI). Several recent FCC consent decrees resolving breaches of CPNI and PI show the FCC will hold...more
Legal professionals in cybersecurity, information governance, and eDiscovery face escalating data volumes, data security challenges, high eDiscovery costs, and information management inefficiencies. With AI-enabled workflows,...more
Are you aware of the critical role Records of Processing Activities (ROPA) play in your privacy compliance strategy? With the rise in data breaches and an increasing emphasis on data transparency, it's essential to stay ahead...more
Why it matters and how it protects your business - Are you aware of the critical role Records of Processing Activities (ROPA) play in your privacy compliance strategy? With the rise in data breaches and an increasing...more
Join us for an insightful webinar with Miller Nash’s head of privacy and data security team, Eva Novick, and colleague, Delfina Homen, where we will delve into the essentials of privacy and data security in 2024. Whether...more
With escalating cyber risks and heightened regulatory scrutiny, every minute after a data breach is crucial. Sophisticated cybercriminals relentlessly target your organization’s most valuable asset: personally identifiable...more
Partner Martin Zoltick ("Marty") and Privacy Ref's Benjamin Siegel will team up for a Rothwell Figg and Privacy Ref co-hosted webinar, "Privacy and AI Governance," taking place Thursday, February 15, 2024, at 1 pm ET. The...more
Join us Wednesday, September 13 at noon for our Ninth Annual Labor & Employment Fall Seminar. This year’s event will be livestreamed from our Chicago office. Our attorneys will discuss the latest employment law updates...more
In February 2023, the Brazilian National Data Protection Authority (ANPD) published the rules for the application of sanctions and the methodology for calculating fines for violation of their General Data Protection Law...more
China’s emerging statutes and regulations governing the processing, disclosure and transfer of data, under threat of severe penalties, pose significant risks for producing parties. Yet, as Chinese entities increasingly become...more
There’s no denying that data breaches are a major concern for organizations of all sizes, 2021 saw 1,860 data breaches occur (a record high), and 81% of those involved sensitive information like social security numbers and...more
The Federal Trade Commission (FTC) now has a full slate of Commissioners and it is expected to ramp up privacy and cybersecurity enforcement and rulemaking in a number of critical areas. Join us for a discussion of the FTC’s...more
Join us for a webinar on basic cyber information regarding data protection, data privacy, cybersecurity requirements PII and Sensitive PII, cybersecurity requirements for Third Party vendors, Cyber insurance in the age of...more
This webinar is intended for eDiscovery professionals interested in the overlap between data privacy and eDiscovery capabilities, workflows and use cases. The tools to tackle the protection of personal data already exist...more
The retention of prolific sensitive, personal electronic information has essentially become a responsibility inherent in the conduct of modern business. From the maintenance of medical records by a healthcare provider to the...more
China recently enacted its Personal Information Privacy Law (PIPL), which came into effect November 1, 2021. PIPL has global reach and broadly regulates entities of all industries that process the personal data of Chinese...more
Learning Objectives: - What is a PIA and a DPIA? - Who should instigate assessments? - How and when to use assessments? - The relationship between assessments and privacy by design, and legal grounds for processing...more
Very recently, various new personal data laws and substantial amendments to existing laws have been promulgated in the Greater China region. For example: - 10 June 2021: New data security laws were promulgated in China...more
We are delighted to announce the second annual GDPR Training Series*, a series of webinars which aims to broaden depth of knowledge and expertise in the general data protection regulations (GDPR). Each session aims to...more
China's draft Personal Information Protection Law (PIPL) has just gone through the second reading and is now near final form and expected to be finalized very soon. Once promulgated, it will be the first comprehensive law on...more
In April, the Chinese government issued a second version of the draft Personal Information Protection Law (Draft PIPL), which will impact global companies. Join us for a joint webinar as we discuss the key provisions of the...more