Everyone Come to Play: Exploring FOCI Mitigation Instruments
Legal Alert | Wiretap Laws in the United States
The ‘Long Arm’ of CIPA and Its Newfound Pen-Trap Claims
Episode 298 -- Electronics Communications Risks and Ephemeral Messaging
Compliant Business Communications Through Messaging Apps
Digital Issues for Individuals Working at Home (Digital Planning Podcast)
Employment Law Now IV-54- A Guest Discussion on 3 Significant Government Decisions
Discussion of PA’s Revised Uniform Fiduciary Access to Digital Assets Act
Podcast: Keeping Up with Recent Changes and Trends in Private Fund Regulation
[WEBINAR] The Public Records Act - Taming the Email Tiger
Organizations whose mantra is “We just never delete anything” (i.e., organizations simply retaining all information indefinitely) are now facing headwinds, especially when the information contains personal information. As our...more
It is challenging for law enforcement to track down and trace illicit activities conducted through digital currencies. The process can be very time- and resource-intensive. Further, securing charges and arrests, and...more
It is hard to imagine how prosecutors were able to bring cases before there was email communications. When I was a prosecutor, we looked for evidence in a lot of other sources, internal memos, calendars and other places where...more