<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd">
  <channel>
    <atom:link href="https://feeds.simplecast.com/rIXGotjZ" rel="self" title="MP3 Audio" type="application/atom+xml"/>
    <atom:link href="https://simplecast.superfeedr.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom"/>
    <generator>https://simplecast.com</generator>
    <title>WRVBLaw Podcast</title>
    <description>Woods Rogers Vandeventer Black combines the forces of Woods Rogers, founded in Roanoke in 1893, and Vandeventer Black, established in Norfolk in 1883. The new firm continues to promote the original firms&apos; principles of mutual respect, community leadership, and unwavering dedication to client service.

The combined firm of more than 130 attorneys provides a robust offering of enhanced legal expertise for Virginia businesses, including the growing technology and manufacturing corridors. 

ATTORNEY ADVERTISING

The following podcast/presentation contains purely informational, educational, or technical material. The views expressed herein represent the opinions of those appearing on the program and do not necessarily reflect those of Woods Rogers Vandeventer Black PLC and, accordingly, should not be construed as representing the opinion of Woods Rogers Vandeventer Black PLC. This content may include attorney advertising. Our videos are for general information about the topics discussed and are not legal advice, nor does any exchange of information associated with this video in any way establishes an attorney-client relationship. 

Disclaimer: https://vanblacklaw.com/disclaimer</description>
    <copyright>2022 Woods Rogers Vandeventer Black PLC</copyright>
    <language>en</language>
    <pubDate>Wed, 20 Apr 2022 14:27:16 +0000</pubDate>
    <lastBuildDate>Tue, 19 Jul 2022 19:25:27 +0000</lastBuildDate>
    <image>
      <link>https://vanblacklaw.simplecast.com</link>
      <title>WRVBLaw Podcast</title>
      <url>https://image.simplecastcdn.com/images/76108e12-6432-468f-acfd-57f31f1d189f/b0b8c0c6-ba2d-4be1-95b9-0cf4cb023dae/3000x3000/wrvblawtm.jpg?aid=rss_feed</url>
    </image>
    <link>https://vanblacklaw.simplecast.com</link>
    <itunes:type>episodic</itunes:type>
    <itunes:summary>Woods Rogers Vandeventer Black combines the forces of Woods Rogers, founded in Roanoke in 1893, and Vandeventer Black, established in Norfolk in 1883. The new firm continues to promote the original firms&apos; principles of mutual respect, community leadership, and unwavering dedication to client service.

The combined firm of more than 130 attorneys provides a robust offering of enhanced legal expertise for Virginia businesses, including the growing technology and manufacturing corridors. 

ATTORNEY ADVERTISING

The following podcast/presentation contains purely informational, educational, or technical material. The views expressed herein represent the opinions of those appearing on the program and do not necessarily reflect those of Woods Rogers Vandeventer Black PLC and, accordingly, should not be construed as representing the opinion of Woods Rogers Vandeventer Black PLC. This content may include attorney advertising. Our videos are for general information about the topics discussed and are not legal advice, nor does any exchange of information associated with this video in any way establishes an attorney-client relationship. 

Disclaimer: https://vanblacklaw.com/disclaimer</itunes:summary>
    <itunes:author>WRVBLAW</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    <itunes:image href="https://image.simplecastcdn.com/images/76108e12-6432-468f-acfd-57f31f1d189f/b0b8c0c6-ba2d-4be1-95b9-0cf4cb023dae/3000x3000/wrvblawtm.jpg?aid=rss_feed"/>
    <itunes:new-feed-url>https://feeds.simplecast.com/rIXGotjZ</itunes:new-feed-url>
    <itunes:keywords>business attorney, business law, law firm</itunes:keywords>
    <itunes:owner>
      <itunes:name>Woods Rogers Vandeventer Black PLC</itunes:name>
      <itunes:email>jserrano@vanblacklaw.com</itunes:email>
    </itunes:owner>
    <itunes:category text="Business">
      <itunes:category text="Management"/>
    </itunes:category>
    <itunes:category text="Business">
      <itunes:category text="Entrepreneurship"/>
    </itunes:category>
    <itunes:category text="Technology"/>
    <item>
      <guid isPermaLink="false">27c7fc0f-bffb-4f53-b541-0f9faa8b7153</guid>
      <title>[Technology Law] How to Protect Your Business Against Ransomware with Jonathan Gallo</title>
      <description><![CDATA[]]></description>
      <pubDate>Wed, 20 Apr 2022 14:27:16 +0000</pubDate>
      <author>jserrano@vanblacklaw.com (Woods Rogers Vandeventer Black PLC)</author>
      <link>https://vanblacklaw.simplecast.com/episodes/technology-roundup-how-to-protect-your-business-against-ransomware-with-jonathan-gallo-wtWEmseN</link>
      <content:encoded><![CDATA[]]></content:encoded>
      <enclosure length="15629677" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d02c9b71-e3d8-497e-a0ec-51374c4e6687/episodes/6e725141-27c4-45c6-becc-f378c998bb22/audio/905b51ff-0069-40a2-8e24-492ad906cefd/default_tc.mp3?aid=rss_feed&amp;feed=rIXGotjZ"/>
      <itunes:title>[Technology Law] How to Protect Your Business Against Ransomware with Jonathan Gallo</itunes:title>
      <itunes:author>Woods Rogers Vandeventer Black PLC</itunes:author>
      <itunes:duration>00:16:17</itunes:duration>
      <itunes:summary>Within the past decade, technology has evolved extremely rapidly, which can be both beneficial and difficult for business owners to navigate. Just as common technology like laptops and mobile banking has evolved, so have the cybercriminals that target businesses in ransomware attacks. </itunes:summary>
      <itunes:subtitle>Within the past decade, technology has evolved extremely rapidly, which can be both beneficial and difficult for business owners to navigate. Just as common technology like laptops and mobile banking has evolved, so have the cybercriminals that target businesses in ransomware attacks. </itunes:subtitle>
      <itunes:keywords>data privacy, cybersecurity, business law, cyber attack, data breach, lawyer, phish, business tips, ransomware, scam, malware, attorney</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
    </item>
    <item>
      <guid isPermaLink="false">850415a6-aed1-42fb-86cc-0be1db451d8c</guid>
      <title>[Cannabis Law] Virginia Seeks to Become the Next State to Decriminalize Possession of Psychedelic Mushrooms by Jonathan Gallo</title>
      <description><![CDATA[<p>After legalizing simple possession of marijuana less than 1 year ago, Virginia is seeking to become the next state, behind <a href="https://www.oregonlive.com/politics/2020/11/oregon-becomes-first-state-to-legalize-psychedelic-mushrooms.html">Oregon</a> to decriminalize the possession of psilocybin or psilocyn, commonly known as psychedelic or “magic” mushrooms.  Recent <a href="https://lis.virginia.gov/cgi-bin/legp604.exe?221+ful+SB262">legislation</a> introduced in the Virginia Senate this week by Senators Ghazala Hashmi (D) and Jennifer Boysko (D) would make the possession of these substances by a person over 21 punishable by a civil penalty of no more than $100.  Currently, possession of these substances is a Class 5 felony punishable by up to 10 years in prison.  A similar <a href="https://lis.virginia.gov/cgi-bin/legp604.exe?221+ful+HB898">bill</a>, introduced in the Virginia House of Delegates by Delegate Dawn Adams (D) would also decriminalize the possession of <a href="https://www.dea.gov/sites/default/files/2020-06/Peyote%20and%20Mescaline-2020_0.pdf">peyote</a>, a cactus that contains the psychedelic compound mescalin, as well as ibogaine, an alkaloid substance found in a native African shrub called <i>Tabernantheiboga</i> that has hallucinogenic properties.</p><p>The legislation follows a slow but growing movement toward decriminalizing certain drugs based on studies of their use in medical applications.  For example, according to the results of a recent <a href="https://ir.compasspathways.com/news-releases/news-release-details/compass-pathways-announces-positive-topline-results">study</a> psilocybin was found to be an effective therapy for treatment-resistant depression and ibogaine has been <a href="https://www.frontiersin.org/articles/10.3389/fphar.2018.00529/full">used</a> to <a href="https://time.com/5951772/ibogaine-drug-treatment-addiction/">treat</a> opioid and other addictions.  However, these hallucinogens are still considered illegal federally and are classified as <a href="https://www.deadiversion.usdoj.gov/schedules/orangebook/c_cs_alpha.pdf">Schedule 1 drugs</a> (similar to heroin and LSD) under the federal Controlled Substances Act (CSA).  Pursuant to the <a href="https://www.dea.gov/drug-information/csa">CSA</a>, Schedule 1 substances have a high potential for abuse, no currently accepted medical use in treatment in the United States, and a lack of accepted safety for use under medical supervision.  However, non-hallucinogenic versions of some of these drugs are being <a href="https://www.sciencedaily.com/releases/2020/12/201209115232.htm">developed</a>.</p><p>Whether either of these bills passes remains to be seen, however, it does demonstrate that Virginia appears to be one of the states at the forefront of new and upcoming drug-related legislation. </p>
]]></description>
      <pubDate>Thu, 20 Jan 2022 17:59:47 +0000</pubDate>
      <author>jserrano@vanblacklaw.com (Woods Rogers Vandeventer Black PLC)</author>
      <link>https://vanblacklaw.simplecast.com/episodes/the-cannabis-connection-virginia-seeks-to-become-the-next-state-to-decriminalize-possession-of-psychedelic-mushrooms-by-jonathan-gallo-1OAhw_0l</link>
      <content:encoded><![CDATA[<p>After legalizing simple possession of marijuana less than 1 year ago, Virginia is seeking to become the next state, behind <a href="https://www.oregonlive.com/politics/2020/11/oregon-becomes-first-state-to-legalize-psychedelic-mushrooms.html">Oregon</a> to decriminalize the possession of psilocybin or psilocyn, commonly known as psychedelic or “magic” mushrooms.  Recent <a href="https://lis.virginia.gov/cgi-bin/legp604.exe?221+ful+SB262">legislation</a> introduced in the Virginia Senate this week by Senators Ghazala Hashmi (D) and Jennifer Boysko (D) would make the possession of these substances by a person over 21 punishable by a civil penalty of no more than $100.  Currently, possession of these substances is a Class 5 felony punishable by up to 10 years in prison.  A similar <a href="https://lis.virginia.gov/cgi-bin/legp604.exe?221+ful+HB898">bill</a>, introduced in the Virginia House of Delegates by Delegate Dawn Adams (D) would also decriminalize the possession of <a href="https://www.dea.gov/sites/default/files/2020-06/Peyote%20and%20Mescaline-2020_0.pdf">peyote</a>, a cactus that contains the psychedelic compound mescalin, as well as ibogaine, an alkaloid substance found in a native African shrub called <i>Tabernantheiboga</i> that has hallucinogenic properties.</p><p>The legislation follows a slow but growing movement toward decriminalizing certain drugs based on studies of their use in medical applications.  For example, according to the results of a recent <a href="https://ir.compasspathways.com/news-releases/news-release-details/compass-pathways-announces-positive-topline-results">study</a> psilocybin was found to be an effective therapy for treatment-resistant depression and ibogaine has been <a href="https://www.frontiersin.org/articles/10.3389/fphar.2018.00529/full">used</a> to <a href="https://time.com/5951772/ibogaine-drug-treatment-addiction/">treat</a> opioid and other addictions.  However, these hallucinogens are still considered illegal federally and are classified as <a href="https://www.deadiversion.usdoj.gov/schedules/orangebook/c_cs_alpha.pdf">Schedule 1 drugs</a> (similar to heroin and LSD) under the federal Controlled Substances Act (CSA).  Pursuant to the <a href="https://www.dea.gov/drug-information/csa">CSA</a>, Schedule 1 substances have a high potential for abuse, no currently accepted medical use in treatment in the United States, and a lack of accepted safety for use under medical supervision.  However, non-hallucinogenic versions of some of these drugs are being <a href="https://www.sciencedaily.com/releases/2020/12/201209115232.htm">developed</a>.</p><p>Whether either of these bills passes remains to be seen, however, it does demonstrate that Virginia appears to be one of the states at the forefront of new and upcoming drug-related legislation. </p>
]]></content:encoded>
      <enclosure length="5118577" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d02c9b71-e3d8-497e-a0ec-51374c4e6687/episodes/522fe3a3-5fb2-4c7f-8555-10e8e10ec483/audio/8fc38c76-8bf2-439a-acdb-1bd0dec1278c/default_tc.mp3?aid=rss_feed&amp;feed=rIXGotjZ"/>
      <itunes:title>[Cannabis Law] Virginia Seeks to Become the Next State to Decriminalize Possession of Psychedelic Mushrooms by Jonathan Gallo</itunes:title>
      <itunes:author>Woods Rogers Vandeventer Black PLC</itunes:author>
      <itunes:duration>00:05:19</itunes:duration>
      <itunes:summary>After legalizing simple possession of marijuana less than 1 year ago, Virginia is seeking to become the next state, behind Oregon to decriminalize the possession of psilocybin or psilocyn, commonly known as psychedelic or “magic” mushrooms. </itunes:summary>
      <itunes:subtitle>After legalizing simple possession of marijuana less than 1 year ago, Virginia is seeking to become the next state, behind Oregon to decriminalize the possession of psilocybin or psilocyn, commonly known as psychedelic or “magic” mushrooms. </itunes:subtitle>
      <itunes:keywords>virginia, legislation, marijuana, mushrooms, psychedelics, psilocyn, mescalin, peyote</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
    </item>
    <item>
      <guid isPermaLink="false">a64159c2-dd0d-45fd-b4f1-4a29863bd9a2</guid>
      <title>[Technology Law] Department of Justice Announces New Civil Cyber-Fraud Initiative by Jonathan Gallo</title>
      <description><![CDATA[Deputy Attorney General Lisa O. Monaco announced the Department of Justice’s new Civil Cyber-Fraud Initiative, aimed at combatting “new and emerging cyber threats to the security of sensitive information and critical systems.”  The Initiative will be led by the Department’s Civil Division Commercial Litigation Branch, Fraud Section, and is a direct result of the Department’s comprehensive cyber review ordered by Deputy Monaco last May.]]></description>
      <pubDate>Tue, 14 Dec 2021 18:05:22 +0000</pubDate>
      <author>jserrano@vanblacklaw.com (Woods Rogers Vandeventer Black PLC)</author>
      <link>https://vanblacklaw.simplecast.com/episodes/department-of-justice-announces-new-civil-cyber-fraud-initiative-jonathan-gallo-technology-roundup-E0kuVxu3</link>
      <enclosure length="5349194" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d02c9b71-e3d8-497e-a0ec-51374c4e6687/episodes/25b6e7f5-d6d9-47a7-a70c-97da27dd6b8e/audio/0c52f8a4-4e2b-4700-9227-5543ea36f265/default_tc.mp3?aid=rss_feed&amp;feed=rIXGotjZ"/>
      <itunes:title>[Technology Law] Department of Justice Announces New Civil Cyber-Fraud Initiative by Jonathan Gallo</itunes:title>
      <itunes:author>Woods Rogers Vandeventer Black PLC</itunes:author>
      <itunes:duration>00:05:34</itunes:duration>
      <itunes:summary>Deputy Attorney General Lisa O. Monaco announced the Department of Justice’s new Civil Cyber-Fraud Initiative, aimed at combatting “new and emerging cyber threats to the security of sensitive information and critical systems.”  The Initiative will be led by the Department’s Civil Division Commercial Litigation Branch, Fraud Section, and is a direct result of the Department’s comprehensive cyber review ordered by Deputy Monaco last May.</itunes:summary>
      <itunes:subtitle>Deputy Attorney General Lisa O. Monaco announced the Department of Justice’s new Civil Cyber-Fraud Initiative, aimed at combatting “new and emerging cyber threats to the security of sensitive information and critical systems.”  The Initiative will be led by the Department’s Civil Division Commercial Litigation Branch, Fraud Section, and is a direct result of the Department’s comprehensive cyber review ordered by Deputy Monaco last May.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
    </item>
    <item>
      <guid isPermaLink="false">e91c057b-4099-4ae6-93cc-b012a4b3ff24</guid>
      <title>[Technology Law] Cybersecurity Maturity Model Certification (CMMC) by Jonathan Gallo</title>
      <description><![CDATA[On November 4, 2021, the Department of Defense (DoD) issued an Advanced Notice of Proposed Rulemaking by releasing the latest and highly anticipated iteration of the CMMC program – CMMC 2.0. ]]></description>
      <pubDate>Tue, 14 Dec 2021 17:52:17 +0000</pubDate>
      <author>jserrano@vanblacklaw.com (Woods Rogers Vandeventer Black PLC)</author>
      <link>https://vanblacklaw.simplecast.com/episodes/cybersecurity-maturity-model-certification-cmmc-jonathan-gallo-technology-roundup-VBlw39dX</link>
      <enclosure length="6591711" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d02c9b71-e3d8-497e-a0ec-51374c4e6687/episodes/dc01f467-2a7c-44a4-8f75-12f48010ea5d/audio/dba9b540-8802-481f-bce7-46a98b4a09bd/default_tc.mp3?aid=rss_feed&amp;feed=rIXGotjZ"/>
      <itunes:title>[Technology Law] Cybersecurity Maturity Model Certification (CMMC) by Jonathan Gallo</itunes:title>
      <itunes:author>Woods Rogers Vandeventer Black PLC</itunes:author>
      <itunes:duration>00:06:51</itunes:duration>
      <itunes:summary>On November 4, 2021, the Department of Defense (DoD) issued an Advanced Notice of Proposed Rulemaking by releasing the latest and highly anticipated iteration of the CMMC program – CMMC 2.0. </itunes:summary>
      <itunes:subtitle>On November 4, 2021, the Department of Defense (DoD) issued an Advanced Notice of Proposed Rulemaking by releasing the latest and highly anticipated iteration of the CMMC program – CMMC 2.0. </itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
    </item>
    <item>
      <guid isPermaLink="false">63524c64-9e8d-4660-8d0c-3d47518512a7</guid>
      <title>[Technology Law] Prioritizing Cybersecurity in a Hybrid Workplace by Jonathan Gallo</title>
      <description><![CDATA[In this day and age, employees are more connected than ever. The hybrid workplace is here to stay, and for employees, this means relying on connected devices from their home offices. ]]></description>
      <pubDate>Tue, 14 Dec 2021 17:48:03 +0000</pubDate>
      <author>jserrano@vanblacklaw.com (Woods Rogers Vandeventer Black PLC)</author>
      <link>https://vanblacklaw.simplecast.com/episodes/prioritizing-cybersecurity-in-a-hybrid-workplace-jonathan-gallo-technology-roundup-gPQa7tei</link>
      <enclosure length="4207225" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d02c9b71-e3d8-497e-a0ec-51374c4e6687/episodes/2b2e968d-a7f7-408b-8431-708b77bcfa1a/audio/599ba91c-da7c-4e1e-bf0b-6a353136b770/default_tc.mp3?aid=rss_feed&amp;feed=rIXGotjZ"/>
      <itunes:title>[Technology Law] Prioritizing Cybersecurity in a Hybrid Workplace by Jonathan Gallo</itunes:title>
      <itunes:author>Woods Rogers Vandeventer Black PLC</itunes:author>
      <itunes:duration>00:04:22</itunes:duration>
      <itunes:summary>In this day and age, employees are more connected than ever. The hybrid workplace is here to stay, and for employees, this means relying on connected devices from their home offices. </itunes:summary>
      <itunes:subtitle>In this day and age, employees are more connected than ever. The hybrid workplace is here to stay, and for employees, this means relying on connected devices from their home offices. </itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
    </item>
    <item>
      <guid isPermaLink="false">9204e202-6be0-45d9-8ac9-9f02587d4c79</guid>
      <title>[Technology Law] Fight the Phish! by Jonathan Gallo</title>
      <description><![CDATA[<p>Phishing has been a staple in the cybersecurity threat landscape for decades. That means that phishing is one of the most dangerous activities to an organization’s cybersecurity health. As a result, the need for proper anti-phishing hygiene and best practices is an absolute must.</p><p>With that in mind, here are a few quick best practices and tips for dealing with phishing threats. Think before you click on any suspicious emails, links, or attachments.</p><p><strong>Know the Red Flags</strong></p><p>Phishes are masters of making their content and interactions appealing. From content design to language, it can be difficult to discern whether the content is genuine or a potential threat, which is why it is so important to know the red flags. Awkward and unusual formatting, overly explicit call-outs to click a hyperlink or open an attachment, and subject lines that create a sense of urgency, are all indicators that the content you received could be a potential phishing attack and should be handled with caution.</p><p><strong>Verify the Source</strong></p><p>Phishing content comes in a variety of ways however, many phishes will try to impersonate someone you may already know – such as a colleague, service provider, or friend – as a way to trick you into believing their malicious content is actually trustworthy. Don’t fall for it. If you sense any red flags that something may be out of place or unusual, reach out directly to the individual through a different method (for example, if the potential phish was an email, call the person instead) to confirm whether the content is authentic and safe. If not, break off communication immediately and flag the incident through the proper channels.</p><p><strong>Be Aware of Vishing and Other Phishing Offshoots</strong></p><p>As more digital natives have come online and greater awareness has been spread about phishing, bad actors have begun to diversify their phishing efforts beyond traditional email. For example, voice phishing, or vishing, has become a primary alternative for bad actors looking to gain sensitive information from unsuspecting individuals. Similar to conventional phishing, vishing is typically executed by individuals posing as a legitimate organization such as a healthcare provider or insurer and asking for sensitive information. Simply put, it is imperative that individuals be wary of any sort of communication that asks for personal information whether it be via email, phone, or chat, especially if the communication is unexpected. If anything seems suspicious, again, break off the interaction immediately and contact the company directly to confirm the veracity of the communications.</p><p>Phishing may be “one of the oldest tricks in the book,” but it is still incredibly effective. And although it may be hard to spot when you may be in the midst of a phishing attempt, by exercising caution and deploying these few fundamentals, individuals and organizations more broadly can drastically mitigate the chances of falling victim to a phishing attack.</p><p>---------------------</p><p>*Adapted from content provided by the <a href="https://staysafeonline.org/">National Cybersecurity Alliance</a> (NCA). Vandeventer Black is an authorized NCA Cybersecurity Champion for their 2021 campaign “Do Your Part. #BeCyberSmart.”</p><p> </p>
]]></description>
      <pubDate>Mon, 13 Dec 2021 21:29:02 +0000</pubDate>
      <author>jserrano@vanblacklaw.com (Jonathan Gallo, phish, scam, cybersecurity, data breach)</author>
      <link>https://vanblacklaw.simplecast.com/episodes/fight-the-phish-jonathan-gallo-technology-roundup-XrSGPVV0</link>
      <content:encoded><![CDATA[<p>Phishing has been a staple in the cybersecurity threat landscape for decades. That means that phishing is one of the most dangerous activities to an organization’s cybersecurity health. As a result, the need for proper anti-phishing hygiene and best practices is an absolute must.</p><p>With that in mind, here are a few quick best practices and tips for dealing with phishing threats. Think before you click on any suspicious emails, links, or attachments.</p><p><strong>Know the Red Flags</strong></p><p>Phishes are masters of making their content and interactions appealing. From content design to language, it can be difficult to discern whether the content is genuine or a potential threat, which is why it is so important to know the red flags. Awkward and unusual formatting, overly explicit call-outs to click a hyperlink or open an attachment, and subject lines that create a sense of urgency, are all indicators that the content you received could be a potential phishing attack and should be handled with caution.</p><p><strong>Verify the Source</strong></p><p>Phishing content comes in a variety of ways however, many phishes will try to impersonate someone you may already know – such as a colleague, service provider, or friend – as a way to trick you into believing their malicious content is actually trustworthy. Don’t fall for it. If you sense any red flags that something may be out of place or unusual, reach out directly to the individual through a different method (for example, if the potential phish was an email, call the person instead) to confirm whether the content is authentic and safe. If not, break off communication immediately and flag the incident through the proper channels.</p><p><strong>Be Aware of Vishing and Other Phishing Offshoots</strong></p><p>As more digital natives have come online and greater awareness has been spread about phishing, bad actors have begun to diversify their phishing efforts beyond traditional email. For example, voice phishing, or vishing, has become a primary alternative for bad actors looking to gain sensitive information from unsuspecting individuals. Similar to conventional phishing, vishing is typically executed by individuals posing as a legitimate organization such as a healthcare provider or insurer and asking for sensitive information. Simply put, it is imperative that individuals be wary of any sort of communication that asks for personal information whether it be via email, phone, or chat, especially if the communication is unexpected. If anything seems suspicious, again, break off the interaction immediately and contact the company directly to confirm the veracity of the communications.</p><p>Phishing may be “one of the oldest tricks in the book,” but it is still incredibly effective. And although it may be hard to spot when you may be in the midst of a phishing attempt, by exercising caution and deploying these few fundamentals, individuals and organizations more broadly can drastically mitigate the chances of falling victim to a phishing attack.</p><p>---------------------</p><p>*Adapted from content provided by the <a href="https://staysafeonline.org/">National Cybersecurity Alliance</a> (NCA). Vandeventer Black is an authorized NCA Cybersecurity Champion for their 2021 campaign “Do Your Part. #BeCyberSmart.”</p><p> </p>
]]></content:encoded>
      <enclosure length="4404570" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d02c9b71-e3d8-497e-a0ec-51374c4e6687/episodes/f7a19b6c-aee3-4f8a-a069-7cd884fc998a/audio/ff2a59e2-7145-4bd7-b26c-8bc65ab4e01d/default_tc.mp3?aid=rss_feed&amp;feed=rIXGotjZ"/>
      <itunes:title>[Technology Law] Fight the Phish! by Jonathan Gallo</itunes:title>
      <itunes:author>Jonathan Gallo, phish, scam, cybersecurity, data breach</itunes:author>
      <itunes:duration>00:04:35</itunes:duration>
      <itunes:summary>One of the most common attack methods mentioned in last week&apos;s episode was phishing.  This episode will discuss the importance of being aware of text messages, emails, or chat boxes that come from someone you do not know or were not expecting.</itunes:summary>
      <itunes:subtitle>One of the most common attack methods mentioned in last week&apos;s episode was phishing.  This episode will discuss the importance of being aware of text messages, emails, or chat boxes that come from someone you do not know or were not expecting.</itunes:subtitle>
      <itunes:keywords>spam, data privacy, cybersecurity, cyber attack, vishing, phish, email spam</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
    </item>
    <item>
      <guid isPermaLink="false">0563d959-aff3-4e5b-9ce6-f36e4761a9db</guid>
      <title>[Cannabis Law] SAFE Banking Act Removed from Defense Spending Bill by Jonathan Gallo</title>
      <description><![CDATA[<h2>Marijuana Banking Legislation Update:</h2><p> </p><p>This week, the Secure and Fair Enforcement (SAFE) Banking Act, which would prohibit financial institutions from being penalized for doing business with marijuana companies, was stripped from the National Defense Authorization Act (NDAA), the omnibus spending bill pending in Congress. In September, the House included the SAFE Banking Act as an amendment to the NDAA for the fiscal year 2022, but the Act was removed by a conference committee in the Senate this week. U.S. Rep. Ed Perlmutter (D – Colorado) confirmed the legislation’s removal <a href="https://twitter.com/RepPerlmutter/status/1468269442089897984?utm_medium=email&utm_source=newsletter&utm_campaign=MJD_20211207_NEWS_Daily">on Twitter</a>.</p><p>The House passed a similar cannabis banking reform bill in 2019, but the legislation has yet to make it through the Senate. <a href="https://docs.house.gov/billsthisweek/20210419/BILLS-117hr1996-SUS.pdf?utm_medium=email&utm_source=newsletter&utm_campaign=MJD_20211207_NEWS_Daily">The SAFE Banking Act</a> would ease restrictions on the use of banking services by legitimate marijuana-related businesses by, among other things, prohibiting a federal banking regulator from penalizing a depository institution for providing banking services to a cannabis-related business where state law allows such businesses.</p><p>According to a <a href="https://twitter.com/RepPerlmutter/status/1440503199702478855?utm_medium=email&utm_source=newsletter&utm_campaign=MJD_20211207_NEWS_Daily">recent tweet by Rep. Perlmutter</a>, the SAFE Banking Act would “strengthen the security of our financial system & keep bad actors like cartels out. Most importantly, it will reduce the risk of violent crime in our communities.”</p><p>The SAFE Banking Act, along with other federal legislation such as the <a href="https://www.congress.gov/bill/117th-congress/house-bill/3617">Marijuana Opportunity Reinvestment & Expungement (MORE) Act</a>, which seeks to remove marijuana from the list of scheduled substances under the Controlled Substances Act, the proposed <a href="https://www.democrats.senate.gov/imo/media/doc/CAOA%20Detailed%20Summary%20-.pdf">Cannabis Administration and Opportunity Act</a>, a comprehensive de-scheduling and restorative justice proposal, and the recently announced <a href="https://www.congress.gov/bill/117th-congress/house-bill/5977?s=1&r=1">States Reform Act</a>, which seeks to end the federal prohibition of marijuana, all represent the latest efforts in Congress to decriminalize marijuana at the federal level. While cannabis reform legislation has been gaining momentum in Congress in recent years, thus far, these efforts have been unsuccessful.</p>
]]></description>
      <pubDate>Fri, 10 Dec 2021 21:44:06 +0000</pubDate>
      <author>jserrano@vanblacklaw.com (Woods Rogers Vandeventer Black PLC)</author>
      <link>https://vanblacklaw.simplecast.com/episodes/safe-banking-act-removed-from-defense-spending-bill-the-cannabis-connection-jonathan-gallo-IVhC_XfF</link>
      <content:encoded><![CDATA[<h2>Marijuana Banking Legislation Update:</h2><p> </p><p>This week, the Secure and Fair Enforcement (SAFE) Banking Act, which would prohibit financial institutions from being penalized for doing business with marijuana companies, was stripped from the National Defense Authorization Act (NDAA), the omnibus spending bill pending in Congress. In September, the House included the SAFE Banking Act as an amendment to the NDAA for the fiscal year 2022, but the Act was removed by a conference committee in the Senate this week. U.S. Rep. Ed Perlmutter (D – Colorado) confirmed the legislation’s removal <a href="https://twitter.com/RepPerlmutter/status/1468269442089897984?utm_medium=email&utm_source=newsletter&utm_campaign=MJD_20211207_NEWS_Daily">on Twitter</a>.</p><p>The House passed a similar cannabis banking reform bill in 2019, but the legislation has yet to make it through the Senate. <a href="https://docs.house.gov/billsthisweek/20210419/BILLS-117hr1996-SUS.pdf?utm_medium=email&utm_source=newsletter&utm_campaign=MJD_20211207_NEWS_Daily">The SAFE Banking Act</a> would ease restrictions on the use of banking services by legitimate marijuana-related businesses by, among other things, prohibiting a federal banking regulator from penalizing a depository institution for providing banking services to a cannabis-related business where state law allows such businesses.</p><p>According to a <a href="https://twitter.com/RepPerlmutter/status/1440503199702478855?utm_medium=email&utm_source=newsletter&utm_campaign=MJD_20211207_NEWS_Daily">recent tweet by Rep. Perlmutter</a>, the SAFE Banking Act would “strengthen the security of our financial system & keep bad actors like cartels out. Most importantly, it will reduce the risk of violent crime in our communities.”</p><p>The SAFE Banking Act, along with other federal legislation such as the <a href="https://www.congress.gov/bill/117th-congress/house-bill/3617">Marijuana Opportunity Reinvestment & Expungement (MORE) Act</a>, which seeks to remove marijuana from the list of scheduled substances under the Controlled Substances Act, the proposed <a href="https://www.democrats.senate.gov/imo/media/doc/CAOA%20Detailed%20Summary%20-.pdf">Cannabis Administration and Opportunity Act</a>, a comprehensive de-scheduling and restorative justice proposal, and the recently announced <a href="https://www.congress.gov/bill/117th-congress/house-bill/5977?s=1&r=1">States Reform Act</a>, which seeks to end the federal prohibition of marijuana, all represent the latest efforts in Congress to decriminalize marijuana at the federal level. While cannabis reform legislation has been gaining momentum in Congress in recent years, thus far, these efforts have been unsuccessful.</p>
]]></content:encoded>
      <enclosure length="3223649" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d02c9b71-e3d8-497e-a0ec-51374c4e6687/episodes/3fa5f296-88dd-4679-9a9a-c6d6ce19efbf/audio/01c22720-1b71-46ec-b848-692b038033f0/default_tc.mp3?aid=rss_feed&amp;feed=rIXGotjZ"/>
      <itunes:title>[Cannabis Law] SAFE Banking Act Removed from Defense Spending Bill by Jonathan Gallo</itunes:title>
      <itunes:author>Woods Rogers Vandeventer Black PLC</itunes:author>
      <itunes:duration>00:03:21</itunes:duration>
      <itunes:summary>This episode discusses the Secure and Fair Enforcement (SAFE) Banking Act, which would prohibit financial institutions from being penalized for doing business with marijuana companies, which was stripped from the National Defense Authorization Act (NDAA), the omnibus spending bill pending in Congress. </itunes:summary>
      <itunes:subtitle>This episode discusses the Secure and Fair Enforcement (SAFE) Banking Act, which would prohibit financial institutions from being penalized for doing business with marijuana companies, which was stripped from the National Defense Authorization Act (NDAA), the omnibus spending bill pending in Congress. </itunes:subtitle>
      <itunes:keywords>safe, marijuana, marijuana bankin, cannabis, ndaa, safe banking act, national defense authorization act, cannabis law</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
    </item>
    <item>
      <guid isPermaLink="false">21e5381b-c229-4059-858e-3b4be42494a9</guid>
      <title>[Technology Law] Tips On Practicing Basic Cyber Hygiene by Jonathan Gallo</title>
      <description><![CDATA[<p>Over the past few years, some of the largest and well-known companies have been affected by data breaches resulting in millions of dollars in losses.  Smaller businesses are not immune from data breaches, and even a small data breach impacting only a few thousand records can expose a business to significant losses and reputational damage that may have a devastating impact on its ability to function.  Various attack methods can be used against businesses to obtain sensitive data or access funds through fraud.  Some common attack methods are compromised credentials, social engineering attacks such as phishing, vishing, and smishing, business email compromise scams, ransomware, and vulnerabilities in third-party software.  While no business can expect to be 100% safe, here are some basic practices businesses can implement to improve their cyber hygiene.</p><p>1. Keep Software Updated</p><ul><li>Keep all software, including applications, web browsers, firmware, and operating systems up to date by installing updates regularly or consider implementing automatic updates</li><li>Discontinue and remove any software that is no longer supported</li></ul><p>2. Use Strong Passwords/Passphrases</p><ul><li>Longer is more secure: consider the longest password allowable or consider using a group of words to create a passphrase that is long and memorable</li><li>Consider using a password manager</li><li>Use separate passwords/phrases for separate accounts</li><li>Never reuse passwords and require password changes on a regular basis</li><li>Limit the number of allowable unsuccessful login attempts</li></ul><p>3. Use Multi-factor Authentication</p><ul><li>Using strong passwords or passphrases alone are not enough and using multi-factor authentication provides a more secure method of authorizing access such as through a temporary code provided on a smartphone or a token</li></ul><p>4. Encrypt Devices</p><ul><li>This includes laptops, tablets, smartphones, removable media that contain sensitive personal information, and data backups</li></ul><p>5. Backup Files</p><ul><li>Utilize data backups. Multiple backups that are separate from your internal network such as through the cloud and/or on external drives or other media are more secure if your network is compromised by ransomware</li></ul><p>6. Secure Wireless Networks</p><ul><li>Change router default name and password and turn off remote management</li><li>Use at least WPA3 encryption</li><li>Limit remote access to the network using a virtual private network (VPN)</li><li>Do not use open wireless networks</li><li>Utilize up to date firewalls and anti-virus software</li></ul><p>7. Be Suspicious of Unexpected Emails, Phone Calls, and Text Messages</p><ul><li>Social engineering attacks can come from a variety of sources</li><li>When in doubt, do not click on suspicious links, attachments, or give out personal information over the phone</li></ul><p>8. Limit Who Has Access to Sensitive Data By Implementing Least Privilege Access</p><ul><li>Determine who requires access to sensitive information and limit access to the lowest level necessary and only to those who require access to perform job functions</li><li>Implement physical security protocols to protect sensitive data. These may include monitoring access to facilities, ensuring visitors are escorted and ensuring that employees who are no longer employed by the business no longer have access to facilities and systems.</li></ul><p>9. Data Destruction</p><ul><li>As part of a data retention policy, require sensitive data that is no longer needed or required by policy or applicable law to be destroyed in a secure manner</li></ul><p>10. Develop an Information Security/Breach Response and Notification Plan</p><ul><li>The worst time to develop an information security/breach response/notification plan is after a breach has already occurred and the plan should include not only the steps to take immediately after a breach is discovered but a process for any required notifications</li><li>Include other policies such as a social media/bring your own device (BYOD) policy to define when and how employees may access these devices, social media, and personal email</li></ul><p>11. Business Continuity/Disaster Recovery Plan</p><ul><li>Any information security plan should include continuity of operations and a disaster recovery plan.</li><li>If a breach or other event impacting the availability of information systems occurs, your business must have the ability to be able to have access to the information you need to continue operating.</li></ul><p>12. Continuous Review</p><ul><li>Once developed, policies should be reviewed and updated at least annually, or more frequently, to ensure they are up to date and accurately reflect your business’s operating model and technical environment.</li></ul><p>13. Training</p><ul><li>Have a regular training program to educate your employees on cyber risk</li><li>Awareness of cyber risks is part of an overall risk mitigation strategy and creates a culture of good cyber hygiene</li></ul><p>Be sure to return to our website throughout October for additional information and resources to raise your business’s cybersecurity awareness and to help prepare for and respond to cyber-attacks.</p>
]]></description>
      <pubDate>Tue, 7 Dec 2021 20:35:05 +0000</pubDate>
      <author>jserrano@vanblacklaw.com (Woods Rogers Vandeventer Black PLC)</author>
      <link>https://vanblacklaw.simplecast.com/episodes/technology-roundup-tips-on-practicing-basic-cyber-hygiene-QT5qVisP</link>
      <content:encoded><![CDATA[<p>Over the past few years, some of the largest and well-known companies have been affected by data breaches resulting in millions of dollars in losses.  Smaller businesses are not immune from data breaches, and even a small data breach impacting only a few thousand records can expose a business to significant losses and reputational damage that may have a devastating impact on its ability to function.  Various attack methods can be used against businesses to obtain sensitive data or access funds through fraud.  Some common attack methods are compromised credentials, social engineering attacks such as phishing, vishing, and smishing, business email compromise scams, ransomware, and vulnerabilities in third-party software.  While no business can expect to be 100% safe, here are some basic practices businesses can implement to improve their cyber hygiene.</p><p>1. Keep Software Updated</p><ul><li>Keep all software, including applications, web browsers, firmware, and operating systems up to date by installing updates regularly or consider implementing automatic updates</li><li>Discontinue and remove any software that is no longer supported</li></ul><p>2. Use Strong Passwords/Passphrases</p><ul><li>Longer is more secure: consider the longest password allowable or consider using a group of words to create a passphrase that is long and memorable</li><li>Consider using a password manager</li><li>Use separate passwords/phrases for separate accounts</li><li>Never reuse passwords and require password changes on a regular basis</li><li>Limit the number of allowable unsuccessful login attempts</li></ul><p>3. Use Multi-factor Authentication</p><ul><li>Using strong passwords or passphrases alone are not enough and using multi-factor authentication provides a more secure method of authorizing access such as through a temporary code provided on a smartphone or a token</li></ul><p>4. Encrypt Devices</p><ul><li>This includes laptops, tablets, smartphones, removable media that contain sensitive personal information, and data backups</li></ul><p>5. Backup Files</p><ul><li>Utilize data backups. Multiple backups that are separate from your internal network such as through the cloud and/or on external drives or other media are more secure if your network is compromised by ransomware</li></ul><p>6. Secure Wireless Networks</p><ul><li>Change router default name and password and turn off remote management</li><li>Use at least WPA3 encryption</li><li>Limit remote access to the network using a virtual private network (VPN)</li><li>Do not use open wireless networks</li><li>Utilize up to date firewalls and anti-virus software</li></ul><p>7. Be Suspicious of Unexpected Emails, Phone Calls, and Text Messages</p><ul><li>Social engineering attacks can come from a variety of sources</li><li>When in doubt, do not click on suspicious links, attachments, or give out personal information over the phone</li></ul><p>8. Limit Who Has Access to Sensitive Data By Implementing Least Privilege Access</p><ul><li>Determine who requires access to sensitive information and limit access to the lowest level necessary and only to those who require access to perform job functions</li><li>Implement physical security protocols to protect sensitive data. These may include monitoring access to facilities, ensuring visitors are escorted and ensuring that employees who are no longer employed by the business no longer have access to facilities and systems.</li></ul><p>9. Data Destruction</p><ul><li>As part of a data retention policy, require sensitive data that is no longer needed or required by policy or applicable law to be destroyed in a secure manner</li></ul><p>10. Develop an Information Security/Breach Response and Notification Plan</p><ul><li>The worst time to develop an information security/breach response/notification plan is after a breach has already occurred and the plan should include not only the steps to take immediately after a breach is discovered but a process for any required notifications</li><li>Include other policies such as a social media/bring your own device (BYOD) policy to define when and how employees may access these devices, social media, and personal email</li></ul><p>11. Business Continuity/Disaster Recovery Plan</p><ul><li>Any information security plan should include continuity of operations and a disaster recovery plan.</li><li>If a breach or other event impacting the availability of information systems occurs, your business must have the ability to be able to have access to the information you need to continue operating.</li></ul><p>12. Continuous Review</p><ul><li>Once developed, policies should be reviewed and updated at least annually, or more frequently, to ensure they are up to date and accurately reflect your business’s operating model and technical environment.</li></ul><p>13. Training</p><ul><li>Have a regular training program to educate your employees on cyber risk</li><li>Awareness of cyber risks is part of an overall risk mitigation strategy and creates a culture of good cyber hygiene</li></ul><p>Be sure to return to our website throughout October for additional information and resources to raise your business’s cybersecurity awareness and to help prepare for and respond to cyber-attacks.</p>
]]></content:encoded>
      <enclosure length="6941338" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d02c9b71-e3d8-497e-a0ec-51374c4e6687/episodes/6fb55d22-dc8f-4f13-b288-b503f8139419/audio/22223633-2a25-412d-88a9-fe6225721fc4/default_tc.mp3?aid=rss_feed&amp;feed=rIXGotjZ"/>
      <itunes:title>[Technology Law] Tips On Practicing Basic Cyber Hygiene by Jonathan Gallo</itunes:title>
      <itunes:author>Woods Rogers Vandeventer Black PLC</itunes:author>
      <itunes:duration>00:07:13</itunes:duration>
      <itunes:summary>In this episode, attorney Jonathan V. Gallo discusses some steps businesses can take to improve their cyber hygiene.</itunes:summary>
      <itunes:subtitle>In this episode, attorney Jonathan V. Gallo discusses some steps businesses can take to improve their cyber hygiene.</itunes:subtitle>
      <itunes:keywords>information technology, data protection, data, data privacy, phising, cybersecurity, security breach, data destruction, technology</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
    </item>
    <item>
      <guid isPermaLink="false">4b87457a-75a5-4eb9-a40a-8906758ac408</guid>
      <title>[Cannabis Law] Cultivating a Cannabis Business Under Virginia&apos;s New Marijuana Laws by Anne Bibeau and Jonathan Gallo</title>
      <description><![CDATA[<p>This recording provides an overview of the recent legislation, the Virginia Cannabis Control Authority and licensing, and general considerations for new businesses in Virginia. ​ </p><p>-Virginia’s Cannabis Landscape​ </p><p>-Virginia’s New Marijuana Law​ </p><p>-Regulations/Licensing​ </p><p>-Business and Employment Considerations </p><p> </p>
]]></description>
      <pubDate>Tue, 18 May 2021 20:16:12 +0000</pubDate>
      <author>jserrano@vanblacklaw.com (Geoffrey G. Hemphill, Anne G. Bibeau, Jonathan V. Gallo)</author>
      <link>https://vanblacklaw.simplecast.com/episodes/cultivating-a-cannabis-business-under-virginias-new-marijuana-laws-jX4HnOfp</link>
      <content:encoded><![CDATA[<p>This recording provides an overview of the recent legislation, the Virginia Cannabis Control Authority and licensing, and general considerations for new businesses in Virginia. ​ </p><p>-Virginia’s Cannabis Landscape​ </p><p>-Virginia’s New Marijuana Law​ </p><p>-Regulations/Licensing​ </p><p>-Business and Employment Considerations </p><p> </p>
]]></content:encoded>
      <enclosure length="44654935" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d02c9b71-e3d8-497e-a0ec-51374c4e6687/episodes/390837bd-c496-4060-9c51-c387bf034eb6/audio/6f6c055a-61cc-449c-9acd-83613ede6ac5/default_tc.mp3?aid=rss_feed&amp;feed=rIXGotjZ"/>
      <itunes:title>[Cannabis Law] Cultivating a Cannabis Business Under Virginia&apos;s New Marijuana Laws by Anne Bibeau and Jonathan Gallo</itunes:title>
      <itunes:author>Geoffrey G. Hemphill, Anne G. Bibeau, Jonathan V. Gallo</itunes:author>
      <itunes:duration>00:46:30</itunes:duration>
      <itunes:summary>This Podcast is an audio version of a recent webinar where #VanBlackLaw attorneys discussed Virginia’s recently passed marijuana law and what entrepreneurs need to know about the legal framework of the state’s newest industry. </itunes:summary>
      <itunes:subtitle>This Podcast is an audio version of a recent webinar where #VanBlackLaw attorneys discussed Virginia’s recently passed marijuana law and what entrepreneurs need to know about the legal framework of the state’s newest industry. </itunes:subtitle>
      <itunes:keywords>marijuana, cannabis, marijuana law, cannabis law, hemp law</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
    </item>
    <item>
      <guid isPermaLink="false">d3b77eca-2290-42c4-a8bc-82534e859b65</guid>
      <title>[Technology Law] Virginia&apos;s New Data Protection Act by Jonathan Gallo</title>
      <description><![CDATA[On this episode of Technology Roundup attorney Jonathan V. Gallo discusses the Consumer Data Protection Act, Virginia’s New Data Privacy Law, entity exclusions, businesses' responsibilities, rights of consumers, and enforcement.]]></description>
      <pubDate>Thu, 13 May 2021 14:46:31 +0000</pubDate>
      <author>jserrano@vanblacklaw.com (Jonathan V. Gallo)</author>
      <link>https://vanblacklaw.simplecast.com/episodes/virginias-new-data-protection-act-gA_VusnQ</link>
      <enclosure length="10773300" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d02c9b71-e3d8-497e-a0ec-51374c4e6687/episodes/1f19f8c3-e0e6-45eb-a7ba-ea7da95faf2d/audio/efa81a2c-758e-4899-a5d1-3845eba64a3a/default_tc.mp3?aid=rss_feed&amp;feed=rIXGotjZ"/>
      <itunes:title>[Technology Law] Virginia&apos;s New Data Protection Act by Jonathan Gallo</itunes:title>
      <itunes:author>Jonathan V. Gallo</itunes:author>
      <itunes:duration>00:11:13</itunes:duration>
      <itunes:summary>On this episode of Technology Roundup attorney Jonathan V. Gallo discusses the Consumer Data Protection Act, Virginia’s New Data Privacy Law, entity exclusions, businesses&apos; responsibilities, rights of consumers, and enforcement.</itunes:summary>
      <itunes:subtitle>On this episode of Technology Roundup attorney Jonathan V. Gallo discusses the Consumer Data Protection Act, Virginia’s New Data Privacy Law, entity exclusions, businesses&apos; responsibilities, rights of consumers, and enforcement.</itunes:subtitle>
      <itunes:keywords>information technology, data protection, legal update, technology</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
    </item>
    <item>
      <guid isPermaLink="false">3275975e-c05a-4621-ab3e-d0c4f18ffc32</guid>
      <title>[Cannabis Law] Weed on the Jobsite: Understanding Virginia&apos;s Marijuana Legalization by Anne Bibeau</title>
      <description><![CDATA[]]></description>
      <pubDate>Mon, 3 May 2021 04:00:00 +0000</pubDate>
      <author>jserrano@vanblacklaw.com (Woods Rogers Vandeventer Black PLC)</author>
      <link>https://vanblacklaw.simplecast.com/episodes/weed-on-the-jobsitel-understanding-virginias-marijuana-legalization-anne-bibeau-the-cannabis-connection-PEXVAtFn</link>
      <content:encoded><![CDATA[]]></content:encoded>
      <enclosure length="46385013" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d02c9b71-e3d8-497e-a0ec-51374c4e6687/episodes/44c9218c-d9a1-49fb-9702-0145ba6540dd/audio/cb839dc2-c910-43a1-b7bc-351d1a887523/default_tc.mp3?aid=rss_feed&amp;feed=rIXGotjZ"/>
      <itunes:title>[Cannabis Law] Weed on the Jobsite: Understanding Virginia&apos;s Marijuana Legalization by Anne Bibeau</itunes:title>
      <itunes:author>Woods Rogers Vandeventer Black PLC</itunes:author>
      <itunes:duration>00:48:19</itunes:duration>
      <itunes:summary>This episode discusses the new Virginia law and how it will affect construction and mining safety in Virginia.
</itunes:summary>
      <itunes:subtitle>This episode discusses the new Virginia law and how it will affect construction and mining safety in Virginia.
</itunes:subtitle>
      <itunes:keywords>legalization, virginia, marijuana, colorado, cannabis law, weed, connecticut</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
    </item>
    <item>
      <guid isPermaLink="false">3c222c83-c88e-4ae0-aacc-f02fcfbb03bb</guid>
      <title>[Cannabis Law] The Current State of The Law Concerning Marijuana in Virginia by Anne Bibeau and Jonathan Gallo</title>
      <description><![CDATA[The following episode discusses Virginia’s General Assembly’s House Bill 2312 and Senate Bill 1406.]]></description>
      <pubDate>Mon, 8 Mar 2021 05:00:00 +0000</pubDate>
      <author>jserrano@vanblacklaw.com (Jonathan Gallo, Anne Bibeau)</author>
      <link>https://vanblacklaw.simplecast.com/episodes/the-current-state-of-the-law-concerning-marijuana-in-virginia-anne-bibeau-and-jonathan-gallo-tw_2rHYR</link>
      <enclosure length="4212053" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d02c9b71-e3d8-497e-a0ec-51374c4e6687/episodes/93218833-f29b-416b-993f-3addeeae576c/audio/28074313-a386-415b-944f-77b1d7819b6d/default_tc.mp3?aid=rss_feed&amp;feed=rIXGotjZ"/>
      <itunes:title>[Cannabis Law] The Current State of The Law Concerning Marijuana in Virginia by Anne Bibeau and Jonathan Gallo</itunes:title>
      <itunes:author>Jonathan Gallo, Anne Bibeau</itunes:author>
      <itunes:duration>00:04:23</itunes:duration>
      <itunes:summary>The following episode discusses Virginia’s General Assembly’s House Bill 2312 and Senate Bill 1406.</itunes:summary>
      <itunes:subtitle>The following episode discusses Virginia’s General Assembly’s House Bill 2312 and Senate Bill 1406.</itunes:subtitle>
      <itunes:keywords>virginia, marijuana, law, cannabis, marijuana law, cannabis law</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
    </item>
  </channel>
</rss>