Features
Expectation of Privacy In Surveillance Cameras
Recently, the Pennsylvania Supreme Court held that audio interceptions did not violate the rights of the defendant under the Wiretap Act, and so were admissible. The Supreme Court drew a proper and logical conclusion from the facts and the law and, hopefully, brought us closer to a reasonable look at the issue, but we still have a long way to go.
Features
One Solution on How the U.S. Government Can Compete for Top Cybersecurity Professionals
While the private sector is undeniably in great need of cybersecurity professionals, the public sector must compete for the limited supply of qualified candidates, particularly those capable of filling high-level positions.
Features
Legal Tech: EU E-discovery 'Phenomenon' Comes With Unique Issues
For a jurisdiction with little to no discovery process, the EU and its stringent privacy requirements may have already emerged as the next frontier for e-discovery providers looking to expand their business outside of the United States. However, the region's relative inexperience with e-discovery could still emerge as a hindrance for vendors eyeing an EU-based expansion.
Features
How Should Directors Respond to the SolarWinds Attack
This article is not about "who did what wrong" or "what nation-state commenced this attack." It's really more about is, "if I am a Director, what should I be thinking about the SolarWinds attack?"
Features
The Situation of Your Company's CISO and How It Impacts Data Security
The intensity of information security briefings often leads to organizations tucking the CISO under the CIO instead. After all, all technology is related, right? This is a huge mistake, and it is wreaking havoc on American data security.
Features
The Unheralded Value of a Contract
The most important part of a contract is the data that it generates. If you take all that data from each contract, then aggregate, organize and analyze it, you will have critical insights into the overall effectiveness of your contracting process and the way you transact business.
Features
Should Your Clients' Involvement With Cryptocurrency Scare You?
It's not a matter of whether you have an interest in crypto, think it's all a bizarre techno-bubble, the eventual replacement for fiat currency, or somewhere in between. The fact of the matter is your clients, and future clients, are more likely than ever to have a connection to this market, and a brief review of the headlines can make this prospect seem terrifying.
Features
The World of NFTs
NFTs have been all the rage lately. So what exactly are they?
Features
Can You Hear Me Now? — Privacy of Discussions
This article looks at privacy discussions, focusing on what in the circumstances discussed renders the IT data private and whether the criteria relied upon when courts and others in the discussion determine that the data is or is not private is truly determinative, as well as properly understood.
Features
How to Avoid 'Privacy Debt'
For many tech companies today, their products and business model require the collection and storage of data. At the same time, a failure to build adequate data protection technology, processes, and operations will continuously generate "privacy debt" for the business. The accumulation of this "privacy debt" can eventually turn away customers, attract regulatory penalties, and create an existential risk for the company.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- How to TOOT Your Own Horn: Exceptional Self EvaluationsIt's that time again. As the year comes to a close many firms are beginning the associate review process. Even if your firm does not have a formal review process I recommend that you write a self-evaluation that outlines your achievements and specifies your goals for the coming year.Read More ›
- The FTC Gets Into the College Athlete NIL GameAs national champions are crowned in men's and women's basketball, hundreds of thousands of college athletes are entering the influencer marketplace for the first time and now find themselves attractive candidates in the fast growing influencer marketing arena. With influencer marketing potentially providing a 5x return on investment, many brands are eager to get into the industry, but it doesn't come without risks as the FTC Commissioner is taking a closer look at the use of influencers for marketing.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
