Law School Toolbox Podcast Episode 318: Listen and Learn -- Negligence: Duties of Professionals and Children
Bar Exam Toolbox Podcast Episode 147: Listen and Learn -- Negligence: Duties of Professionals and Children
NGE OnDemand: Cybersecurity Issues and Standard of Care with David Wheeler
Law School Toolbox Podcast Episode 257: Listen and Learn -- The "Reasonable Person" Standard
Bar Exam Toolbox Podcast Episode 88: Listen and Learn -- Negligence Per Se
In a first of its kind trial, a defendant accused of negligently responding to a data breach was cleared of all liability by a jury last month. After two hours of deliberation, the jury rejected plaintiff’s claim that the...more
In this segment NGE Intellectual Property partner David Wheeler provides an overview of basic cybersecurity hygiene and insight about how the law is developing around cyber threats. He presents some of the standard by...more
• The U.S. Department of Health and Human Services on Dec. 28, 2018, announced the release of the "Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients" that provides a "Call to Action" to make...more
2019 will bring significant privacy law changes in the U.S. These changes will require significant compliance efforts by companies operating in the U.S. this year. It is still an open question as to whether those compliance...more
Artificial Intelligence (AI) systems, including the use of algorithms and computer software to analyze complex data and perform certain decision making functions without direct human involvement, are rapidly developing in...more
Seyfarth Synopsis: A string of recent class action lawsuits regarding businesses’ use of employees’ biometric data should put employers on heightened alert regarding compliance with various state biometric privacy laws....more
As reported on Friday in the Krebs on Security blog, online broker Scottrade had sent an e-mail to customers earlier that day stating that it recently had learned from law enforcement officials that Scottrade was one of a...more
Many of the highest-profile and headline-catching data breaches involve external breaches of a company’s electronic systems. But the reality that these headlines obscure is the fact that internal data breaches are generally...more