small-logo
ProfessionalsCapabilitiesInsights & NewsCareersLocations
About UsAlumniOpportunity & InclusionPro BonoCorporate Social Responsibility
Stay Connected:
facebookinstagramlinkedintwitteryoutube
Site Search
  • Professionals (398)
  • Capabilities (82)
  • Experience (88)
  • Insights & News (5,018)
  • Other Results (149)

Professionals 398 results

Robert Kerr
Robert Kerr
Chief Information Officer
  • New York
Email
+1 212-294-9580
vCard

Chief Information Officer

  • New York
John Rosenthal
John Rosenthal
Partner
  • Washington, DC
Email
+1 202-282-5785
vCard

Partner

  • Washington, DC
Charlie Papavizas
Charlie Papavizas
Partner
  • Washington, DC
Email
+1 202-282-5732
vCard

Partner

  • Washington, DC
View All Professionals

Capabilities 82 results

Practice Area

Privacy: Regulated Personal Information (RPI)

Winston’s Regulated Personal Information (RPI) Practice offers seamlessly integrated counseling and litigation services to companies looking for practical and
solution-oriented assistance navigating the compliance, regulatory, and private class action enforcement risks presented by the emerging patchwork of
complex (and often conflicting) privacy laws in the United States and beyond.
...Read more

Practice Area

eDiscovery & Information Governance

Winston’s eDiscovery & Information Governance Practice (eDiscovery Group) is one of the United States’ largest and most experienced. Per The Legal 500 US
2024, “[Winston has] a very strong practice from top to bottom. They have a good e-discovery consulting practice and excellent review and production
capabilities and are amongst the strongest advocates you could want in a courtroom.” We have built a full-service consulting practice to support ...Read more
...Read more

Practice Area

Government Program Fraud, False Claims Act & Qui Tam Litigation

Investigations and litigation involving alleged fraud against the government pose a significant and growing threat to organizations and individuals across all
industries that engage directly or indirectly in business with federal, state, and/or local governments. The government makes aggressive use of its extensive
criminal and civil investigatory powers to root out alleged fraud and abuse implicating government funds, including one of its most powerful civil ...Read more
...Read more

Experience 88 results

Experience

|

May 27, 2025

PicoCELA Inc. Closes $1.8 Public Offering

Experience

|

May 15, 2025

Winston Secures Federal Circuit Victory for Snap Axing Image-Presentation Patents on the Pleadings

Experience

|

May 9, 2025

An Am Law LOTW Shout Out-Worthy Gold Medal Victory In $Jenner

View All Experience

Insights & News 5,018 results

Tax Impacts

|

August 20, 2025

|

7 Min Read

Crypto Tax Update: New Tax Rules on the Horizon?

On July 30, President Trump’s Working Group on Digital Assets released its comprehensive “Strengthening American Leadership in Digital Financial Technology” report (the Report). The 160-plus-page report sets forth a series of recommendations seeking to “ensure crypto becomes a hallmark of the new American Golden Age” while outlining a proposed framework for regulating digital assets. A key section of the Report focuses on the taxation of digital assets and sets forth proposals on the modernization of the tax framework to better align with the realities of the digital asset ecosystem. The proposals address a range of substantive tax issues, including the classification of digital assets for tax purposes, the timing and character of income from mining and staking activities, and the tax treatment of stablecoins, and also recommends updates to taxpayer and third-party reporting requirements.

Capital Markets & Securities Law Watch

|

August 19, 2025

|

6 Min Read

NYSE Comes to Texas

The New York Stock Exchange (NYSE) has relocated its Chicago-based electronic exchange to Dallas, Texas, rebranding it as NYSE Texas (NYSE Texas). The move is intended to capitalize on Texas’s pro-business environment and the state’s significant concentration of NYSE-listed companies. 

Investigations, Enforcement, & Compliance Alerts

|

August 18, 2025

|

2 Min Read

PE Fund on Hook for Portco’s False Claims Act Cybersecurity Violations

DOJ False Claims Act (FCA) settlements related to cybersecurity typically have focused on false representations by a government contractor of its compliance with cybersecurity requirements. A recently announced settlement shows that private equity owners are not immune from potential FCA liability.

View All Insights & News

Other Results 149 results

Site Content

What Is GIPA?

The Illinois Genetic Information Privacy Act (GIPA), enacted in 1998, prohibits employers and their agents from conditioning employment on genetic data, or
from using genetic data in discriminatory ways. The statute also prohibits insurers from seeking genetic information to use in connection with accident or
health insurance policies.
...Read more

Site Content

The Corporate Transparency Act
Task Force

Law Glossary

What Is Theft of Confidential Information Law?

Theft of confidential information law is a legal area that covers both business information and customer data stolen from a company. When confidential data
is stolen from a computer or a network, a company has the right to file a lawsuit against the responsible party under the Computer Fraud and Abuse Act. This
law is also violated when hackers steal the personally identifiable information of consumers through unauthorized access to a network.
...Read more
Logo
facebookinstagramlinkedintwitteryoutube

Copyright © 2025. Winston & Strawn LLP

AlumniCorporate Transparency Act Task ForceDEI Compliance Task ForceEqual Rights AmendmentLaw GlossaryThe Oval UpdateWinston MinutePrivacy PolicyCookie PolicyFraud & Scam AlertsNoticesSubscribeAttorney Advertising

We, our service providers, and other third parties use cookies and other analytics, advertising, and tracking technologies on this site. Your information, including personal information and interactions with this site, may be monitored, recorded, or collected through these tools and further used or disclosed by us, our service providers, and authorized third parties. For more details, please visit our privacy policy.