Investigations and Cognitive Interviews
Implications of the SEC Cybersecurity Disclosure Rule
Healthcare Document Retention
Vicky Hanks of Blake Morgan on Building an Effective Employee Brand - Passle's CMO Series Podcast
Behavioral Health Compliance
Conducting Healthcare Compliance Investigations
Navigating the Storm: Crisis Management in the Workplace — Hiring to Firing Podcast
Episode 299 -- Bobby Butler on the Compliance Profession and the Future of Compliance
Compliance Auditing & Monitoring
Web-based Tracking Technology and AI: HIPAA Compliance Issues for Health Care Practices
PODCAST: Williams Mullen's Benefits Companion - SECURE 2.0 Act Relief for Plan Corrections
What Physicians Need to Understand About Balance Billing
What Nonprofit Board Leadership Needs To Know About Internal Investigations
Compliance with the New EU-US Data Privacy Framework
Compliant Business Communications Through Messaging Apps
Interactive Compliance Policies
GILTI Conscience Podcast | Tax Insurance 101
Consumer Finance Monitor Podcast Episode: A Look at the Treasury Department’s April 2023 Report on Decentralized Finance or “DeFi”
Personal Devices and Messaging: Evolving Compliance Concerns and Best Practices
#WorkforceWednesday: What the End of the COVID-19 Public Health Emergency Means for Employers - Employment Law This Week®
When it comes to ensuring that data is preserved and available for litigation, investigations, or government inquiries, it all starts with establishing and codifying clear data governance policies and procedures....more
The Internet of Things (“IoT”) has ushered in a new era of connectivity and convenience, but with it comes a host of legal issues and emerging theories of liability. As IoT devices become increasingly ubiquitous in our daily...more
Seyfarth Synopsis: The health care sector faces escalating cybersecurity risks given its size, technological dependence and the sensitive nature of data used therein. According to the U.S. Department of Health and Human...more
Report on Patient Privacy 21, no. 11 (November, 2021) - Attorney Brad Hammer doesn’t always don a suit and tie, or what he calls his “lawyer’s uniform.” A privacy and security expert and founder of the Vakaris Group based...more
A ransomware attack is no company’s idea of a good time, but I do sense one positive development emerging from the epidemic of attacks we’ve witnessed this year: Boards and senior management agree that they must move beyond a...more
[author: Matt Kelly] In September 2020 the National Institute of Standards and Technology (NIST) unveiled the fifth version of its cybersecurity standard formally known as SP 800-53, “Security and Privacy Controls for...more
Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more
On March 9, 2020, two final rules on electronic health information were issued by the Office of National Coordinator for Health Information Technology (ONC) and the Centers for Medicare and Medicaid Services (CMS)....more
Now that DOD has released the final version of the Cybersecurity Maturity Model Certification (CMMC) guidelines, all contractors that work directly or indirectly on Department of Defense (DOD) contracts should be preparing to...more
Practical steps to address cybersecurity threats—what you should do when heightened tension in the Middle East or other events increase the threat of cybersecurity incidents. - When news events or business initiatives turn...more
Heidi Rudolph, Managing Director at Morae Global, has spent a great deal of time considering technology’s role, risks and rewards for compliance teams. She contributed an article...more
Mark Lanterman, Chief Technology Officer of Computer Forensic Services lives technology at its most terrifying, helping organizations manage the risks of the IT we all use constantly. Recently he authored an article...more
In the coming weeks we will be releasing a series of FAQs examining the California Consumer Privacy Act (“CCPA”) of particular importance to employers. These FAQs should help employers determine if they are required to comply...more
For several years now, we’ve been alerting employers about the dangers of phishing scams that attempt to obtain private and personal information from employers... Many of these scams rear their ugly head around tax season,...more
Letter from the Editors - We are thrilled to provide you with the first issue of Mintz Levin’s TechConnect, a bi-monthly newsletter on “all things technology” in the legal and business world, from our perspective, of...more