Hsu Untied interview with Chad Shear, Partner at Cooley
Bar Exam Toolbox Podcast Episode 281: Why Do People Fail the Bar Exam? BET Tutors Weigh In (Part 2)
Law School Toolbox Podcast Episode 471: Life as a Trial Lawyer (w/Jim Brosnahan)
Podcast - The Basic Rules for Closing Argument
Alessandria San Roman Shares Her Cuban-American Journey and Its Influence on Her Legal Career
Bar Exam Toolbox Episode Update 1: The "California Bar Exam Experiment"
Hsu Untied interview with Dean Fealk, Partner at DLA Piper
Law School Toolbox Podcast Episode 470: Tips for Neurodivergent Law Students (w/Heather Varanini and Rebecca Petrilli)
Hsu Untied interview with John Wayne Horton, Partner at Lowenstein Sandler
Hsu Untied interview with Casey McCracken, Partner at Gibson Dunn
Bar Exam Toolbox Podcast Episode 280: Why Do People Fail the Bar Exam? BET Tutors Weigh In (Part 1)
Law School Toolbox Podcast Episode 469: The Power of Professional Style: A Conversation with Alison Bruhn and Delia Folk
Hsu Untied interview with Jason Hirsch, Partner at Nixon Peabody
Hsu Untied interview with David Niemeyer, Partner at Skadden
Bar Exam Toolbox Podcast Episode 279: Quick Tips -- Retaking the Bar Exam After Failing
Law School Toolbox Podcast Episode 468: Playing the Role of You (w/Pam Sherman)
Closing Argument: Opportunity and Challenge
Hsu Untied interview with Lily Zhang, Partner at Jones Day
Hsu Untied interview with James Abe, Partner at Alston & Bird
Law School Toolbox Podcast Episode 467: Surviving Migration in the Age of Technology (w/Petra Molnar)
In this episode of The Privacy Insider Podcast, Keith Enright, the outgoing Chief Privacy Officer at Google, joins host Arlo Gilbert to share what it’s like to be at the privacy helm of one of the world’s most influential–and...more
Seyfarth Synopsis: Federal judges are requiring attorneys to attest as to whether they have used generative artificial intelligence (AI) in court filings, and if so, how and in what manner it was used. These court orders come...more
Most observers believe that the legal profession is rapidly moving toward so-called “hybrid workplaces,” a term office managers use to describe a mixed-work environment that spans brick-and-mortar law offices, home offices,...more
An enhanced resource for analysis of data breach notification laws for all 50 states is now just a click away. BakerHostetler combined two of its state breach notification law resources (a summary of the laws and a guide to...more
Snell & Wilmer’s Breach Response Team regularly guides clients through all phases of data breach and cyber incident response, including leading internal investigations related to data breaches and cyber incidents in...more
In less than four months, the General Data Protection Regulation (the "GDPR" or the "Regulation") will take effect in the European Union/European Economic Area, giving individuals in the EU/EEA greater control over their...more
“To Harmonize or Not To Harmonize: That Is the Question.” With the the GDPR fast approaching on May 25, 2018, European Member States are getting ready with the implementation of national legislation. Although the GDPR is a...more
Five years ago few legal departments were concerned with – let alone focused on – data privacy or security. Most of those that were aware of the terms assumed that these were issues being handled by IT, HR, or marketing...more
In the ever-changing landscape of data security, it is increasingly clear that law firms of all sizes, from the one-lawyer shop to the 1,000-lawyer megafirm, are being targeted by hackers. As the methods used to gain access...more
U.S. companies now have to consider breach notification requirements under the GDPR in addition to data breach notification laws in the U.S. (enacted by 48 states and numerous regulators). Follow our chart to determine if...more
Many human resource professionals may not be familiar with data security-related terminology. As a result, when an incident occurs there can be confusion when terms like “security event” or “data breach” are thrown around....more
The average cost of a data breach, on both an aggregate and a per-record basis, has decreased slightly according to the Ponemon Institute's 2017 Cost of Data Breach Study: Global Overview. In addition to presenting recent...more
In a recent formal Ethics Opinion, the American Bar Association stressed that lawyers must make reasonable efforts to prevent inadvertent or unauthorized access to confidential information relating to the representation of...more
China's new Cybersecurity Law ("new Law") is set to come into effect on June 1, 2017, and introduces sweeping provisions that may have a significant impact on companies doing business in and with China. To provide guidance on...more
Shortly after the new year, the Federal Trade Commission filed suit in the Northern District of California against D-Link Corporation, a Taiwan-based maker of wireless routers, Internet Protocol (IP) cameras, and software...more
In this edition of Class Action Roundup, we feature decisions from the third quarter of 2016, covering everything from pizza delivery and Uber drivers to payday lenders, canned tuna manufacturers, and even...more
With the ever-increasing amount of personal information stored online, it is unsurprising that data breach litigation has become increasingly common. A critical issue in nearly all data breach litigation is whether a...more
More than 5,000 companies had taken advantage of the now defunct U.S.-EU Safe Harbor Framework. Those companies are now considering whether to join the newly approved “Privacy Shield,” and are trying to understand the...more
The attached chart constitutes a summary of the laws of various jurisdictions that govern data breach notifications....more
Data security officers typically look for security risks by monitoring reports from automated security systems, listening to employees’ reports of security issues, and/or auditing IT systems. There is a great deal of debate,...more
The general definition of “personal information” used in the majority of statutes is: An individual’s first name or first initial and last name plus one or more of the following data elements: (i) Social Security number, (ii)...more
The chart blow constitutes a summary of the laws of various jurisdictions that govern data breach notifications. ...more
Senior Counsel Peter Swire to Debate European Privacy Activist Max Schrems. The debate, set to take place on January 26 in Brussels, will highlight key differences between certain European and U.S. attitudes towards U.S....more
A New York district court opinion is the latest addition to our watch of ongoing VPPA-related disputes, a notable decision on the issue of what exactly is a disclosure of “personally identifiable information” (PII) under the...more
As multinational employers are aware, data privacy laws can vary greatly from jurisdiction to jurisdiction. Ensuring compliance with the different requirements can be challenging, and the penalties for noncompliance can be...more