Everyone Come to Play: Exploring FOCI Mitigation Instruments
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 211: Cybersecurity and Privacy Risks for the Healthcare Industry with Brandon Robinson of Maynard Nexsen
Fraud Prevention Techniques for Nonprofit Organizations - Part 3
Steps Your Nonprofit Can Take to Mitigate Fraud Risks - Part 2
Why Retailers and Merchants Should Pay Attention to the CFPB - The Consumer Finance Podcast
The Justice Insiders Podcast - The Ever-Expanding Net: Corporate Compliance in an Era of Increasing Trade Sanctions and Restrictions
Fraud Risks at Nonprofit Organizations - Part 1
False Claims Act Insights - If Everything Matters, Nothing Does: Parsing Materiality in FCA Disputes
AGG Talks: Cross-Border Business Podcast - Episode 18: Navigating U.S. Sanctions and Their Implications for Non-U.S. Individuals and Entities
Navigating U.S. Sanctions and Their Implications for Non-U.S. Individuals and Entities
Power, Privacy, and Protection: Unpacking Security Challenges in the Energy Sector - Energy Law Insights
FCA Uncovered: Mitigating Risk in the Regulatory Spotlight — Regulatory Oversight Podcast
JONES DAY PRESENTS®: Cross-Border Trade Secret Litigation in the United States
Navigating Employment and Separation Agreements: Lessons From Al Pacino's Serpico — Hiring to Firing Podcast
What's the Tea in L&E? Love Contracts: Consensual Relationships in the Workplace
CMO Series EP131 - Noni Garratt-Wall of Charles Russell Speechlys on The Art Of A Law Firm Rebrand
Life After Love Gone Wrong Podcast: Season 3, Episode 4 - Splitting Costs: Forensic Accounting in Divorce
No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
What to Do If the Government Knocks on Your Company’s Door … or Breaks It Down – Speaking of Litigation Podcast
Marketing Minute with NP Strategy (Video): How to Respond to a Cyber Security Breach
When litigating high-profile cases, attorneys must tread carefully in handling confidential materials, especially when protective orders are in place. In Cahill v. Nike, Inc., an inadvertent disclosure by counsel to the press...more
ComplexDiscovery’s Editor’s Note: Generative AI is reshaping industries, and the legal community is facing pressing challenges, particularly concerning the authenticity of digital evidence. As AI technology continues to...more
This is the conclusion to a two part article. Please read Part One first. There must be legal recourse to stop this kind of fraud and so protect our basic freedoms. People must have good cause to believe in our judicial...more
On April 19, 2024, the Advisory Committee on Evidence Rules for federal courts faced a critical question: Does AI-generated evidence, including deepfakes, demand new rules? The Committee’s surprising answer—’not yet.’ Was...more
What can we do to address the challenge of Deepfakes being presented as relevant and authentic evidence in the justice system? Deepfake technology poses a serious challenge to establishing and rebutting the authenticity of...more
An Interview with Dr. Maura Grossman by Kate Halloran - What do you recommend that law firms focus on when developing policies around the responsible use of AI? Firms must have a very clear idea of the scope of permissible...more
ComplexDisocvery’s Editor’s Note: This article underscores the growing significance of cyber diplomacy in the context of global security and international relations. As cyber threats become increasingly sophisticated and...more
In November of 2022, ChatGPT upended our thinking about artificial intelligence with a new form of machine learning called Generative AI (GenAI). Since then, discussions about GenAI models like GPT have taken center stage in...more
Unless you have been living under a rock for the past year, you have heard something about artificial intelligence (AI). AI chat, art, and everything in between have been all over social media and news feeds. The AI craze...more
95% of all corporate investigations include message and conversation data as key evidence. When gathering this crucial data from employees’ mobile phones, are you having to ship equipment or struggling with lengthy support...more
In 2003 Judge Shira Scheindlin wrote “once a party reasonably anticipates litigation, it must suspend its routine document retention/destruction policy and put in place a 'litigation hold' to ensure the preservation of...more
A Legal Hold, also known as litigation hold, document hold, hold order, or preservation order, has more commonly been a US term but organisations in the UK and Europe also need to ensure their data preservation practices are...more
The success of any eDisclosure project, whether litigation, investigation or regulatory compliance, depends on the story that your data tells and often, how expeditiously you can acquire that data for analysis. Yet forensic...more
Is eDiscovery Existing in a Post-Sanctions World? The short (and obvious) answer is no. Rule 37(e) isn’t going anywhere. But recent case law indicates a trend where sanctions seem to be harder to come by, which may play...more