Why Your Data is Key to Reducing Risk and Increasing Efficiency During Investigations and Litigation
CyberSide Chats: Yes, you needed a cyber attorney a long time ago (with Erik Weinick)
CMMC Is Coming: Are You Ready?
FCPA Compliance Report-Episode 326, Paula Long On The Intersection Of Data Security And Compliance
Study Reveals Alarming Statistics On Theft and Employee Misuse of Company Data
Fresh from a cybersecurity briefing I provided to many of Sherman & Howard’s clients and industry partners, I returned to my desk to learn the Department of Defense (DoD) recently issued its final rule on the Cybersecurity...more
On September 26, 2024, the First Circuit Court of Appeals ruled against extending California’s strict noncompete ban to agreements executed outside of California and governed by another state’s law. This decision highlights...more
A new US National Cybersecurity Alliance survey shows that over one-third (38%) of “employees share sensitive work information with artificial intelligence (AI) tools without their employer’s permission.” Not surprisingly,...more
In the world of business, safeguarding your company’s valuable information is crucial to maintaining a competitive edge. One of the most important assets a company can have is its trade secrets. But what exactly are trade...more
The widespread availability of Artificial Intelligence (AI) tools has enabled the growing use of “deepfakes,” whereby the human voice and likeness can be replicated seamlessly such that impersonations are impossible to detect...more
Collusion among rivals has long been considered the “supreme evil of antitrust.” It is not surprising, therefore, that antitrust scrutiny was applied to one hospital’s decision to employ the Chief Executive Officer of its...more
The Bureau of Industry and Security (BIS) issued new guidance to prevent the diversion of controlled items to Russia. This guidance recommends the use of the Trade Integrity Project (TIP) database, which tracks suppliers with...more
Last week, the National Counterintelligence and Security Center (“NCSC”), the Office of Economic Security and Emerging Technologies (“OESET”) and other coordinating government agencies issued a warning to U.S. venture...more
Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more
On June 20, the Department of Commerce’s Bureau of Industry and Security (BIS) for the first time banned a software and cybersecurity company using authority provided by June 2023’s “Protecting Americans’ Sensitive Data from...more
The Standards provide a framework for all Chinese companies’ sustainability disclosures and the applicability extends beyond listed companies. On May 27, 2024, China’s Ministry of Finance published the new Corporate...more
When it comes to the true source of a company’s value, it’s not necessarily in the products or the services they offer, nor is it in the brand they’ve carefully developed. The core of a company’s value is in the trade secrets...more
Confidential Business Information (CBI) is the information that is unique to the corporation that owns it. It’s anything key to the business that the company would not want its competitors or the public to know. It’s the...more
On January 26, 2023, Cigna Corp. (“Cigna”) sued CVS Health Corp. (“CVS”) and its newly hired chief product officer Amy Bricker (“Bricker”), in the US District Court for the Eastern District of Missouri, for allegedly...more
The integration of artificial intelligence (AI) has revolutionized various industries, offering efficiency, accuracy, and convenience. In the realm of estate planning and family offices, the integration of AI technologies has...more
At the end of May, the Israel Competition Authority’s Director General published a consent decree with Mizra Delicacy Food Industries and Zilber Meat and Sausage Products Industries. Both companies agreed to pay approximately...more
Minnesota’s governor has now signed into law that state’s comprehensive privacy law. For those keeping count – that is number 19 of state “comprehensive” privacy laws, with six in 2024 alone. The Minnesota law will go into...more
Navigating the dynamic landscape of insider risk management requires a nuanced understanding of organisational dynamics, culture and regulatory imperatives. The costs (both direct and indirect) of getting it wrong are high,...more
Dickinson Wright attorney Kim Ruppel recently participated in The Risky Health Care Business Podcast, where she and host Scott Nelson delved into the intricate world of noncompetes and their ramifications for both health care...more
Originally published in American Business Magazine - May 2024. Many small- and mid-sized business owners believe that they are not prime targets for a cyber breach and that threat actors only go after large companies. This...more
To help you stay on top of the latest news, our AI practice group has compiled a roundup of the developments we are following....more
The final rule is the anticipated result of years of workshops on the topic, and follows the FTC’s January 19, 2023 proposed rule and 90-day public comment period. Enactment of a federal ban is not surprising, given that many...more
Substantial amendments to the Investment Canada Act (ICA) were enacted on March 22, 2024, with the passing of Bill C-34, the National Security Review of Investments Modernization Act. These amendments, long in the works, will...more
Editor’s note: This is an updated version of our January 12, 2023, client alert. This update covers new staff SEC guidance addressing the options companies have when existing confidential treatment orders approach expiration....more