No Password Required: Founder and Commissioner of the US Cyber Games, CEO of the Cyber Marketing Firm Katzcy, and Someone Who Values Perseverance Over Perfection
Biometric Litigation
Founder of Cyber Security Unity, Member of the Order of the British Empire, and Appreciator of '80s Soap Operas
Illinois Supreme Court Clarifies BIPA Violation Accruals, Opening the Door for “Annihilative” Damage
No Password Required: The Custom T-Shirt-Wearing CEO Who Not Only Appreciates Mega Man ... He Basically Is One
Hybrid Workforces and Compliance with Sheila Limmroth
Legislating Data Privacy Series: A Conversation with Massachusetts Representatives Dave Rogers and Andy Vargas
State Law Privacy Video Series | Privacy and Sensitive Information
Podcast: BIPA Trends in 2022
State Law Privacy Video Series | Applicability
Getting Personal—Wearable Devices, Data, and Compliance
Episode 8: Why brokers, not breaches, are America's greatest privacy threat (with Rob Shavell)
NGE On Demand: Personal Data Protection Travels: The New Standard Contractual Clause with John Koenigsknecht and David Wheeler
Inside Privacy Law: The Regulation of Personal Data
NGE On Demand: Cybersecurity Considerations for Emerging Companies with Michael Gray and David Wheeler
Oklahoma: Changing Data Privacy as We Know It?
The Convergence of AI and Data Privacy in eDiscovery: Using AI and Analytics to Identify Personal Information
Reducing Cybersecurity Burdens with a Customized Data Breach Workflow
Sitting with the C-Suite: Looking Ahead to Potential Compliance Issues Due to COVID-19
Sitting with the C-Suite: Information Governance and eDiscovery - Key Compliance Issues for In-House Counsel
We often think of phony financial institution emails as a bad actor’s phishing scheme of choice to capture confidential bank account numbers or other private financial information. While those phishing emails certainly do...more
A new study by Check Point Research shows that cyber criminals are using well-known brands to lure victims into clicking on nefarious links, providing personal information or credentials, or getting users to transfer money....more
Google has announced plans to shutter Google Plus, its “floundering answer to Facebook,” following the discovery of a security vulnerability that “exposed the private data of up to 500,000 users of the service.” Google...more
Happy National Cybersecurity Awareness Month. I wish it was more uplifting than the current state of affairs, but it has never been so important. ...more
McAfee Report Lists Health Care Sector as Most Targeted Industry for Cyber-Attacks - In its cybersecurity incident report outlining vulnerabilities for the second quarter of 2017, security firm McAfee lists the health care...more
Video Privacy Protection Act - This article explores how personally identifiable information has been defined in leading Video Privacy Protection Act actions and looks at how concerns over the potential sensitivity of...more
Tale of the tape. The Video Privacy Protection Act (VPPA), which requires video service providers to destroy personally identifiable information after a specified time, doesn’t provide a private right of action for plaintiffs...more
In Mollett, et al. v. Netflix, Inc., No. 12-17045 (9th Cir. July 31, 2015), the Court of Appeals for the Ninth Circuit affirmed the dismissal of a putative class action filed against Netflix, Inc. for alleged violations of...more
Technology has allowed consumers to use Apps and devices to stream their favorite content at the touch of a button. The popularity of these streaming Apps and devices has raised legal issues with regard to privacy....more
Internet video streaming site Hulu.com is subject to the Video Privacy Protection Act (VPPA), 18 U.S.C. § 2710, according to a recent decision by the U.S. District Court for the Northern District of California, marking the...more