No Password Required: Founder and Commissioner of the US Cyber Games, CEO of the Cyber Marketing Firm Katzcy, and Someone Who Values Perseverance Over Perfection
Biometric Litigation
Founder of Cyber Security Unity, Member of the Order of the British Empire, and Appreciator of '80s Soap Operas
Illinois Supreme Court Clarifies BIPA Violation Accruals, Opening the Door for “Annihilative” Damage
No Password Required: The Custom T-Shirt-Wearing CEO Who Not Only Appreciates Mega Man ... He Basically Is One
Hybrid Workforces and Compliance with Sheila Limmroth
Legislating Data Privacy Series: A Conversation with Massachusetts Representatives Dave Rogers and Andy Vargas
State Law Privacy Video Series | Privacy and Sensitive Information
Podcast: BIPA Trends in 2022
State Law Privacy Video Series | Applicability
Getting Personal—Wearable Devices, Data, and Compliance
Episode 8: Why brokers, not breaches, are America's greatest privacy threat (with Rob Shavell)
NGE On Demand: Personal Data Protection Travels: The New Standard Contractual Clause with John Koenigsknecht and David Wheeler
Inside Privacy Law: The Regulation of Personal Data
NGE On Demand: Cybersecurity Considerations for Emerging Companies with Michael Gray and David Wheeler
Oklahoma: Changing Data Privacy as We Know It?
The Convergence of AI and Data Privacy in eDiscovery: Using AI and Analytics to Identify Personal Information
Reducing Cybersecurity Burdens with a Customized Data Breach Workflow
Sitting with the C-Suite: Looking Ahead to Potential Compliance Issues Due to COVID-19
Sitting with the C-Suite: Information Governance and eDiscovery - Key Compliance Issues for In-House Counsel
On January 7, 2019, the Securities and Exchange Commission’s Office of Compliance Inspections and Examinations (OCIE) announced its 2020 examination priorities. In doing so, OCIE identified certain areas of technology-related...more
Beginning in 2016, the computer hacking organization known as “The Dark Overlord,” began to target victims in the St. Louis, Missouri area, including various health care providers, several accounting firms, and a medical...more
Kromtech Security has reported that the sensitive personal information of more than 25,000 investors of Bezop cryptocurrency was exposed when a MongoDB database was left unsecured. The security incident is reported to be...more
Discussions about “blockchain” technology seem to be everywhere these days, with potential applications spanning industries as diverse as banking, healthcare, real estate, law enforcement, entertainment, and even wine and...more
Earlier this week, a federal grand jury in Brooklyn returned an indictment criminally charging a self-described “day trader” with various offenses in connection with an alleged computer hacking scheme involving more than 50...more
Most insiders are chalking up last week’s CVS/Aetna news to a recent Amazon push into the pharma world. The Journal breaks down exactly what that means—both for the industry and for Amazon, which faces a series of challenges...more
Equifax’s ex-CEO Richard Smith will be on the Hill today to address the a subcommittee of the House Energy and Commerce Committee. Smith is expected to report that a “widespread breakdown in security safeguards” at his former...more
The Times’ tech guru—Farhad Manjoo—gets all indignant regarding the Equifax breach. Namely, if Equifax can’t handle its one job of safeguarding personal info, should it really be allowed to keep going at all now?...more
Troubled Japanese auto parts maker Takata, “crippled by vast airbag recalls,” has filed for bankruptcy protection in the US and is planning to sell its surviving operations to Key Safety Systems, an American rival owned by a...more
Some forms of cyber extortion are automated and not targeted at any specific victim. For example, “ransomware” refers to a type of malware that prevents users from accessing their systems unless, and until, a ransom is paid....more
Many of the world’s leading financial services providers have started developing their own blockchains, either to facilitate the potential for creating their own cryptocurrency, to add an additional layer of security to...more