Podcast - Decoding the Future of AI Regulation and Frontier Models
The Privacy Insider Podcast Ep. 8: Privacy Over Party: Peter Swire
No Password Required: Founder of Cybersafe Foundation and an Obama Foundation Africa Leaders Fellow, Who Is Comfortable in the API Kitchen
Podcast - Robots, Rights and New Tech: Balancing Innovation and Data Privacy
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 211: Cybersecurity and Privacy Risks for the Healthcare Industry with Brandon Robinson of Maynard Nexsen
The Privacy Insider Podcast Ep. 7: David, Goliath, and Data Privacy Part II: Max Schrems
When AI Meets PI: Assessing and Governing AI from a Privacy Perspective
Navigating Emerging Privacy Issues in Financial Services — The Consumer Finance Podcast
The Privacy Insider Podcast Episode 4: Don't Be Evil: In the Hot Seat of Data Privacy, Part 1
The American Privacy Right Act (APRA) explained
Navigating the Regulation Jungle: How to Be Compliant, Work Efficiently, and Stay Sane
Legal Alert | Wiretap Laws in the United States
Business Better Podcast Episode: Cyber Adviser – A Comparison of AI Regulatory Frameworks
Preventative Medicine: Health Care AI Privacy and Cybersecurity – Part 1 — The Good Bot Podcast
Cost of Noncompliance: More Than Just Fines
Will the U.S. Have a GDPR? With Rachael Ormiston of Osano
The Team Continues to Grow: A Conversation With Our Newest Colleague, Kaitlin Clemens — Unauthorized Access Podcast
[Webinar] Midyear Data Privacy Check-in: Trends & Key Updates
Decoding Privacy Laws: Insights for Small to Mid-Sized Businesses — Regulatory Oversight Podcast
No Password Required: Education Lead at Semgrep and Former Czar for Canada’s Election Security
As the manufacturing and industrial sectors continue to embrace digital transformation and navigate complex global markets, the year ahead presents both new opportunities and challenges. From evolving data privacy and AI...more
In the realm of mergers and acquisitions (M&A), due diligence is a critical phase where a buyer’s acquisition team assesses potential risks and opportunities before finalizing the terms of an agreement to purchase its target...more
The only thing truly certain about the proposed U.S. outbound investment regulatory regime is that a lot of uncertainty remains. But industry responses garnered during the comment period may, at least partly, foretell the...more
Introduction - The latest EY-Parthenon Deal Barometer reveals an anticipated 12% increase in corporate mergers and acquisitions (M&A) activity for the year 2024, with more than a third of CEOs actively planning to make an...more
The U.S. Supreme Court will likely decide before the end of its current term whether the failure to make a disclosure pursuant to Item 303 of Regulation S-K can serve as the basis for a securities fraud claim under Section...more
When I reflect on the relationship that our firm has with our clients, I’m most proud of the fact that you can always count on us. That often means defending complex litigation, steering you through regulatory threats,...more
On October 11th, our Data, Privacy and Security team hosted the 10th Annual Cybersecurity & Privacy Summit. We were delighted to be joined by about 100 clients, colleagues, and friends in-person at our Atlanta office, with...more
To set the stage, it is important we review the current privacy and cybersecurity landscape. New privacy laws and regulations are emerging at both the state and federal levels, not to mention internationally, imposing...more
Data is the lifeblood of your organization. It sets the foundation for new business initiatives, workflows, and innovations. As it grows exponentially, its value also grows immeasurably—that is, if it is effectively managed....more
Data is like the mail: it just keeps coming in, day after day. Storing and maintaining it is a never-ending process. Excess data can slow down operations, diminishing a law firm’s productivity, profitability, and public...more
Marita A. Makinen, Chair of the firm’s Mergers & Acquisitions practice and co-Chair of the Transactions & Advisory Group, and Ken Fishkin, CISSP, CIPP/US, CIPM, CIPT, Manager of Information Security at Lowenstein Sandler,...more
Cyber risks are increasing, and as a result, due diligence inquiries and valuations are increasingly focusing on the cybersecurity and privacy risks inherent in a business’s collection, use, retention and disposal of data. ...more
When entering into any merger or acquisition (both a stock deal and an asset deal), there are numerous privacy and data security issues that must be evaluated and addressed from the beginning. Most companies in today’s online...more
On this episode of CyberSide Chats, Epiq’s CISO Jerich Beason, and this week’s co-host Whitney McCollum are joined by Stefanie Drysdale to discuss M&A. They discuss the process of evaluating a target company’s cybersecurity...more
Privacy and security diligence has become standard in M&A transactions, but a one-size-fits-all approach won’t work. While form questionnaires have their place, companies need to know when to take a deeper, more technical...more
The 2021 edition of BakerHostetler’s annual Data Security Incident Response Report – a report based on the firm’s experience with data security incident response and litigation over the past year – features a number of...more
CYBERSECURITY & DATA PRIVACY - Virginia Governor Signs Nation’s Second State Consumer Privacy Bill - The Washington Post reported that Governor Ralph Northam signed data privacy legislation into law, making Virginia the...more
As anyone who has been through a corporate sale process can tell you, there is no such thing as a “standard” M&A transaction. Every deal is different and presents a unique set of challenges. This is especially true of...more
On January 18, 2021, the 10th amendment of the German Act against Restraints of Competition (ARC) entered into force. The so-called "ARC Digitization Act," designed to modernize German competition law enforcement for the era...more
Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirement, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more
We are excited to bring the healthcare compliance sessions and updates to you as an interactive, online experience. Watch, listen, and ask questions. Each hour, attendees will be able to select from four concurrent sessions....more
Now that DOD has released the final version of the Cybersecurity Maturity Model Certification (CMMC) guidelines, all contractors that work directly or indirectly on Department of Defense (DOD) contracts should be preparing to...more
On January 21 and 22, 2020, we will be hosting our 8th McDermott International Seminars in Osaka and Tokyo respectively. These seminars will focus on cross-border M&A, GDPR, intellectual property, global enforcements and...more
Competition law enforcement agencies have undertaken many new initiatives focused on the digital economy, including publishing position papers, developing enforcement strategies, hiring specialized personnel, and taking...more
Data Privacy & Security- How Did A Hacker Allegedly Access A Million Customers’ Personal Data? Let the FTC Count the Ways. The FTC has reached a settlement with technology company InfoTrax Systems, L.C. and its CEO...more