Why Your Data is Key to Reducing Risk and Increasing Efficiency During Investigations and Litigation
CyberSide Chats: Yes, you needed a cyber attorney a long time ago (with Erik Weinick)
CMMC Is Coming: Are You Ready?
FCPA Compliance Report-Episode 326, Paula Long On The Intersection Of Data Security And Compliance
Study Reveals Alarming Statistics On Theft and Employee Misuse of Company Data
International travel may pose serious data security risks – especially for your foreign national workers carrying sensitive, proprietary, or regulated information. Travelers must be aware of potential border inspections,...more
The protection of trade secrets and confidential information is critical to the success of many organizations. Employers must remain vigilant against the growing risk of sensitive information being compromised, especially...more
Privacy pros are passionate about doing good work, in every sense of the word. Yes, we care about managing privacy as thoroughly and efficiently as possible (and not getting fined). But we are all in this line of work for a...more
In recent years, TikTok has become a widely used platform for communication and content sharing, boasting nearly 2 billion users globally and 170 million active users in the U.S. alone. And while other social media platforms...more
The Department of Justice Antitrust Division (DOJ) and the Federal Trade Commission (FTC) (together, the Agencies) issued Antitrust Guidelines for Business Activities Affecting Workers (2025 Guidelines) in January. The 2025...more
Insider threats continue to present a significant challenge for organizations of all sizes. One particularly concerning scenario involves employees who leave an organization and impermissibly take or download sensitive...more
Multistate employers with employees in Texas are subject to state laws regarding employment agreements. Whether your business is large or small, specific provisions within your agreements could render your agreements...more
I’m often asked whether employees should have access to the company’s cap table. The cap table is one of the most sensitive and critical documents in any startup. At its most basic level, it lays out who owns what –...more
Our White Collar, Government & Internal Investigations Team offers effective and actionable best practices for companies to follow in conducting their internal investigations....more
In today’s fast-paced business environment, efficient contract lifecycle management (CLM) is essential for maintaining operational integrity and ensuring compliance. At the heart of effective CLM implementations lies data...more
Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more
On October 29, 2024, the Department of Justice (“DOJ”) published its Notice of Proposed Rulemaking (“NPRM”) to implement President Biden’s Executive Order 14117, “Preventing Access to Americans’ Bulk Sensitive Personal Data...more
During an investigation, it is not uncommon to discover that an individual has forwarded business emails to their private email address. This ruling from the Higher Regional Court Munich shows the potential implications of...more
On September 26, 2024, the First Circuit Court of Appeals ruled against extending California’s strict noncompete ban to agreements executed outside of California and governed by another state’s law. This decision highlights...more
A new US National Cybersecurity Alliance survey shows that over one-third (38%) of “employees share sensitive work information with artificial intelligence (AI) tools without their employer’s permission.” Not surprisingly,...more
In the world of business, safeguarding your company’s valuable information is crucial to maintaining a competitive edge. One of the most important assets a company can have is its trade secrets. But what exactly are trade...more
The widespread availability of Artificial Intelligence (AI) tools has enabled the growing use of “deepfakes,” whereby the human voice and likeness can be replicated seamlessly such that impersonations are impossible to detect...more
The Bureau of Industry and Security (BIS) issued new guidance to prevent the diversion of controlled items to Russia. This guidance recommends the use of the Trade Integrity Project (TIP) database, which tracks suppliers with...more
Last week, the National Counterintelligence and Security Center (“NCSC”), the Office of Economic Security and Emerging Technologies (“OESET”) and other coordinating government agencies issued a warning to U.S. venture...more
Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more
On June 20, the Department of Commerce’s Bureau of Industry and Security (BIS) for the first time banned a software and cybersecurity company using authority provided by June 2023’s “Protecting Americans’ Sensitive Data from...more
The Standards provide a framework for all Chinese companies’ sustainability disclosures and the applicability extends beyond listed companies. On May 27, 2024, China’s Ministry of Finance published the new Corporate...more
When it comes to the true source of a company’s value, it’s not necessarily in the products or the services they offer, nor is it in the brand they’ve carefully developed. The core of a company’s value is in the trade secrets...more
Confidential Business Information (CBI) is the information that is unique to the corporation that owns it. It’s anything key to the business that the company would not want its competitors or the public to know. It’s the...more