News & Analysis as of

Risk Mitigation Risk Management Confidential Information

Spilman Thomas & Battle, PLLC

HHS Cybersecurity Performance Goals and the Healthcare Industry

The healthcare industry is a major target for cyberattacks because of all of the personal information collected from patients. Recognizing that the healthcare industry is such a ripe hunting ground for cybercriminals, the...more

Foley & Lardner LLP

Navigating the AI Frontier: Legal and Operational Insights Into Generative AI

Foley & Lardner LLP on

In our ever-changing technological environment, artificial intelligence (AI) is beginning to exert its influence on numerous sectors, revolutionizing our approach to work. As businesses and organizations worldwide adopt...more

EDRM - Electronic Discovery Reference Model

3 Strategies for BYOD Risk Mitigation with Departing Employees

Companies continue to adopt Bring Your Own Device (BYOD) policies to save money and relieve employees of the “two-phone burden.” However, such policies come with clear risks. Companies must remain particularly concerned when...more

Bailey & Glasser, LLP

Friend or Foe? Legal Risks Arising From ChatGPT and Other Generative AI Software

Bailey & Glasser, LLP on

Recent breakthroughs in generative artificial intelligence (AI) have captured significant media attention. Developers argue that the technology, which learns from data to produce new text, visual, or audio content based on a...more

U.S. Legal Support

[Webinar] Culture of Confidentiality: How to ensure your external vendors are mitigating cybersecurity risk - July 20th, 10:00 am...

U.S. Legal Support on

Despite strengthening security across and beyond the business, many legal organizations overlook a critical vulnerability with surprising frequency – the risk presented by third parties. Cybersecurity risk is further...more

Epiq

[Webinar] What is insider risk, and why do companies ignore it? - November 16th, 12:00 pm AEDT

Epiq on

What is insider risk? Managing and minimising risk in your organisation starts with understanding the types of risks in the modern workplace. Some risks are driven by external events and factors that are outside of direct...more

Ervin Cohen & Jessup LLP

Mitigating a Company’s Liability When a Data Breach Is Suffered by a Vendor or Service Provider

Data breaches by large companies have been in the news for some time. Over the last several years several companies, including Marriott, Yahoo and Volkswagon, have been victimized by hackers who have broken into a company’s...more

Epiq

[Webinar] What is insider risk, and why do companies ignore it? - October 7th, 11:30 am - 12:10 pm GMT

Epiq on

What is insider risk? Managing and minimising risk in your organisation starts with understanding the types of risks in the modern workplace. Some risks are driven by external events and factors that are outside of direct...more

Morgan Lewis

Responding to the 2019 Novel Coronavirus: Guidance for US Employers

Morgan Lewis on

The outbreak of the 2019 Novel Coronavirus (2019-nCoV) has created a number of questions and compliance challenges for employers in the United States as well as across the globe. This is a fluid and rapidly changing...more

Lowndes

Here’s What You Need To Know About Protecting Trade Secrets

Lowndes on

What do you do when a key employee leaves and you believe he/she has taken your company’s trade secrets to a competitor? Or when a strategic business partner uses your trade secret information to compete against you?...more

Hahn Loeser & Parks LLP

Contractors – Protect Your Confidential Information from Wrongful Disclosure

Unit pricing and other confidential information contained within your bid documents may be recognized as a trade secret under Ohio’s Uniform Trade Secret Act and similar federal laws. What does that mean? In simple terms, it...more

Orrick, Herrington & Sutcliffe LLP

The Most Cost Effective Way You Can Protect Your Trade Secrets

I was giving a talk recently when a senior executive asked me, “If we have the time and resources to focus on just one thing to improve our information security, what would you suggest?”  I didn’t hesitate: “Train your...more

12 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide