An Ounce of Prevention: Keys to Understanding and Preventing AI and Cybersecurity Risks
AD Nauseam: AI – We Had to Discuss it Eventually
Digital Planning Podcast Episode: AI Developments - Planning & Practice Considerations
Podcast - California Employment News: The Use of A.I. in the Workplace – Privacy & Confidentiality Concerns
California Employment News: The Use of A.I. in the Workplace – Privacy & Confidentiality Concerns
AD Nauseam: The FTC’s Updated Endorsement Guides: Get into the Groove
Webinar Recording – Assessing the Surge in Wiretap Litigation
Machine Learning for Environments with Bad Actors
K&L Gates Triage: Drones and Disruption in the Health Care Field
Health Tech Podcast - Episode 2: Best Practices for Health App Development
Wearables and the Future of Intellectual Property Law
BakerHostetler Partner Paul Karlsgodt Discusses Privacy Class Actions
Polsinelli Podcasts: Cloud Computing, From Cybersecurity to Confidentiality Issues
A Moment of Simple Justice - Forms
Generative artificial intelligence (“GAI”) has the potential to revolutionize efficiency and productivity in our day-to-day working lives. But while this technology is becoming more sophisticated by the day, companies should...more
In Shalagin v. Mercer Celgar Limited Partnership, 2023 BCCA 373 (“Shalagin”), the British Columbia Court of Appeal affirmed that surreptitiously recording fellow employees may constitute just cause....more
“Shall we play a game?” Those innocuous words “spoken” by Matthew Broderick’s computer in John Badham’s sci-fi techno-thriller War Games stunned audiences at the time. A computer that could “talk” and “think” and engage in...more
Consider the scenario in which opposing counsel provided a settlement offer that the client approved, but the lawyer has not communicated its acceptance to opposing counsel prior to the client’s death. A zealous advocate may...more
Editor’s Note: On March 17, 2021, HaystackID shared an educational webcast designed to inform and update legal and data discovery professionals on how organizations are preparing and responding to increasing security and...more
On April 1, the California Supreme Court ruled in Smith v. LoanMe Inc. that California Penal Code Section 632.7 prohibits both parties to a communication and nonparties, such as an individual who covertly intercepts and...more
The California Supreme Court overturned the California Court of Appeals to hold that a party to a phone call can violate California Penal Code section 632.7 by recording the conversation without the consent of the other...more
Confidentiality is fundamental to the client-lawyer relationship. Are you talking to your lawyer within earshot of a family member or a third person? Are you talking to your lawyer within earshot of a listening device?...more
Google Health’s Partnerships Raise Privacy Concerns - Recently, Google has been at the center of privacy concerns due to its health- sharing collaborations with the University of Chicago Medical Center (the Medical Center)...more
While we have been talking about the very important message of educating employees about data security, I find that giving employees tips about their personal data security keeps them interested and engaged during education...more
Information requests in the realm of labor relations are simple in theory but can be complicated in practice. We have seen how the topics of information sought by a union can cause skirmishes, sometimes deliberately so. We...more
In a Privacy Peril last month we noted steps you can take to lockdown your Facebook account so you are not inadvertently sharing data with unintended third parties. While recent revelations have disclosed how extensively...more
We previously reported that U.S. Customs and Border Patrol (CBP) have been stopping U.S. citizens at the borders of the United States and demanding passwords for access to mobile devices. According to CBP, 19,051 mobile...more
Effective on January 6, 2018, the PA Supreme Court’s “Public Access Policy” adds significant new requirements related to information contained in documents filed in Pennsylvania’s courts, including the Orphans’ Court Division...more
Not all cybersecurity risks are the stuff of super-secret code hacks or high-tech digital attacks. One of the biggest culprits: off-the-shelf thumb drives (also known as flash drives or memory sticks) that you can purchase...more
One of my favorite lines when I conduct employee education about data privacy and cybersecurity is “Keep Your Day Job.” The context of the comment is when I tell audiences about the dumb moves of employees who think they can...more
Seyfarth Synopsis: Although longstanding policy of U.S. Customs and Border Protection authorizes searches of electronic devices in the possession of travelers arriving in the United States, recent reports of such searches...more
Personnel issues generate great stories. The work that HR professionals, in-house counsel, and employment lawyers do is full of human drama and often very interesting. It’s natural for people to want to know what’s behind...more
Back in December of last year, we reported that for the first time, a U.S. law firm – Johnson & Bell, a mid-sized Chicago firm – was publicly named in a class action data security lawsuit. Last month, the firm obtained a...more
There has been lots of talk about the ripple effects of the Trump travel ban. But here’s a new twist I hadn’t heard before—U.S. Customs and Border Control (CBP) agents are detaining U.S. citizens and requiring them to unlock...more
I still remember typewriters. Heck, I still remember carbon paper, mimeographs and bag phones. Would a company, “back in the day”, have ever asked an employee, “hey, we need you to bring your own typewriter, desk,...more
The California Supreme Court recently denied considering an appellate court ruling from a case in Eureka that police arrest videos cannot be considered confidential officer personnel records and therefore kept from public...more
On August 11, 2016, a Florida state court judge held that the University Central Florida Board of Trustees (“UCF”) must produce Budget Request forms and Activity and Service Fee Database records to Knight News, Inc. (“KNI”)...more
The Supreme Court recently adopted a proposed change to Rule 41 of the Federal Rules of Criminal Procedure that would allow a federal judge to issue warrants authorizing government agents to access computers located in any...more
One of the Consumer Financial Protection Bureau’s (CFPB) key investigative and enforcement tools is to issue Civil Investigative Demands (CIDs), a form of an administrative subpoena that requires the recipient to produce...more