With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National Highway Traffic Safety Administration (“NHTSA”) has broad regulatory...more
9/27/2023
/ Automotive Industry ,
California Consumer Privacy Act (CCPA) ,
Consent ,
Consumer Privacy Rights ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data-Sharing ,
Encryption ,
Federal Trade Commission (FTC) ,
FTC Act ,
Internet of Things ,
Motor Vehicles ,
NHTSA ,
Privacy Laws ,
Section 5 ,
Technology Sector
Are Automakers Making Sufficient Efforts to Protect Customer Data?
With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more
9/27/2023
/ Artificial Intelligence ,
Automotive Industry ,
Censorship ,
Consumer Privacy Rights ,
CRISPR ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data-Sharing ,
DNA ,
Educational Institutions ,
Hackers ,
Information Technology ,
Internet of Things ,
Life Sciences ,
Machine Learning ,
NHTSA ,
Personal Data ,
Popular ,
Regulatory Freeze ,
Regulatory Oversight ,
Risk Management ,
Social Media ,
Technology Sector
Tech Vendors and Cybersecurity – Are They Responsible?
It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
4/25/2023
/ Algorithms ,
Archived Data ,
Artificial Intelligence ,
Burden of Proof ,
Commercial Litigation ,
Content Publishing ,
Contract Terms ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Retention ,
Data Security ,
Data Storage ,
Defamation ,
Educational Institutions ,
Electronic Communications ,
Electronically Stored Information ,
Fox News ,
Free Speech ,
Indemnification Clauses ,
Indemnity ,
Libel ,
Machine Learning ,
News Stories ,
Personal Information ,
Political Speech ,
Popular ,
Risk Management ,
Robots ,
School Districts ,
Settlement ,
Social Media ,
Software ,
Software Developers ,
Students ,
Technology Sector ,
Vendor Contacts ,
Vendors
It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you if its product is compromised and results in a data...more
4/25/2023
/ Contract Terms ,
Cyber Attacks ,
Cybersecurity ,
Data Collection ,
Data Protection ,
Data Security ,
Indemnification Clauses ,
Indemnity ,
Software ,
Software Developers ,
Technology Sector ,
Vendor Contacts ,
Vendors
It is imperative that a company knows what data it holds, why it is holding it, where it holds it, and who has access to it. The old adage that information is power leads many to believe that holding on to as much data as...more
Data privacy professionals have characterized the data privacy risks associated with ChatGPT as a “nightmare.” In order to function, open artificial intelligence programs (“OpenAI”) like ChatGPT require huge amounts of data...more
4/25/2023
/ Algorithms ,
Artificial Intelligence ,
Bots ,
Data Collection ,
Data Privacy ,
Educational Institutions ,
Machine Learning ,
Personal Information ,
Risk Management ,
School Districts ,
Students ,
Technology
Amazon Sued for Not Telling New York Store Customers about Tracking Biometrics -
“Thanks to a 2021 law, New York is the only major American city to require businesses to post signs letting customers know they’re tracking...more
4/3/2023
/ 3D Printing ,
Authorship ,
Biometric Information ,
Biometric Information Privacy Act ,
Biotechnology ,
Chief Information Security Officer (CISO) ,
Class Action ,
Cryptocurrency ,
Cyber Attacks ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data Security ,
Disclosure Requirements ,
Divorce ,
DNA ,
Email ,
Employer Liability Issues ,
Facial Recognition Technology ,
Fingerprints ,
Human Embryos ,
Incident Response Plans ,
Life Sciences ,
Medical Devices ,
Non-Fungible Tokens (NFTs) ,
Personal Data ,
Personally Identifiable Information ,
Popular ,
Securities and Exchange Commission (SEC) ,
State and Local Government ,
Technology Sector
Biometric identifiers are unique to every individual. They include your fingerprints, facial structure, and even how you walk. There is the Illinois Biometric Information Protection Act (“BIPA”), and biometric protection...more
4/3/2023
/ Biometric Information ,
Biometric Information Privacy Act ,
Class Action ,
Data Collection ,
Data Privacy ,
Facial Recognition Technology ,
Fingerprints ,
Legislative Agendas ,
Personal Data ,
Personally Identifiable Information ,
Privacy Laws ,
State and Local Government ,
State Legislatures ,
State Privacy Laws
Illinois has the strictest biometric privacy law in the country with the Biometric Information Privacy Act (“BIPA”). The BIPA requires employers who collect employees’ biometric data to follow a number of protocols. These...more
3/3/2023
/ Biometric Information ,
Biometric Information Privacy Act ,
Data Collection ,
Employer Liability Issues ,
Employment Litigation ,
Fingerprints ,
IL Supreme Court ,
Illinois ,
Personally Identifiable Information ,
Privacy Laws ,
State and Local Government
Illinois Supreme Court Allows Massive Damages in Biometric Privacy Cases -
“The case involves Ohio-based fast-food company White Castle.”
Why this is important: Illinois has the strictest biometric privacy law in the...more
3/2/2023
/ Acquisitions ,
Biometric Information ,
Biometric Information Privacy Act ,
CEOs ,
Corporate Governance ,
Cryptocurrency ,
Data Collection ,
Data Privacy ,
Department of Defense (DOD) ,
Department of Justice (DOJ) ,
Disclosure Requirements ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Healthcare ,
IL Supreme Court ,
Mental Health ,
Popular ,
Privacy Laws ,
Risk Assessment ,
Risk Management ,
Securities and Exchange Commission (SEC) ,
Stablecoins ,
Technology Sector ,
TikTok ,
Universities
Your biometric data tells the tale of who you are in intricate detail. Often, your biometric data is used to verify your identity at work or school. Currently, Illinois has the most comprehensive biometric privacy law in the...more
2/6/2023
/ Biometric Information ,
Biometric Information Privacy Act ,
Data Collection ,
Data Privacy ,
Personal Data ,
Privacy Laws ,
Proposed Legislation ,
Regulatory Agenda ,
State and Local Government ,
State Privacy Laws ,
Technology
Recently, lawsuits have been filed against Duke and WakeMed regarding their use of Meta’s Meta Pixel tracking product and the alleged improper disclosure of patients’ protected health information (“PHI”). The U.S. Department...more
12/21/2022
/ Covered Entities ,
Data Breach ,
Data Collection ,
Department of Health and Human Services (HHS) ,
Disclosure ,
Electronic Protected Health Information (ePHI) ,
Health Care Providers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
HIPAA Breach Notification Rule ,
HIPAA Privacy Rule ,
Notice Requirements ,
OCR ,
PHI ,
Technology ,
Tracking Systems
Collecting data from a California customer’s use of the chat feature on your website without first obtaining the customer’s permission may constitute a violation of Section 631(a) of the California Invasion of Privacy Act...more
North Carolina Power Outage Points to Homeland Security Long-Documented Threats to US Power Grid -
“Moore County blackouts serve as reminder that nation’s electricity infrastructure could be vulnerable targets for domestic...more
12/16/2022
/ Advertising ,
Banking Sector ,
Chapter 11 ,
Class Action ,
Consumer Privacy Rights ,
Coronavirus/COVID-19 ,
Critical Infrastructure Sectors ,
Cuba ,
Cybersecurity ,
Data Collection ,
Debt Collection ,
Department of Homeland Security (DHS) ,
Electricity ,
FDIC ,
Federal Trade Commission (FTC) ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Healthcare ,
Infrastructure ,
Non-Bank Lenders ,
OCR ,
Phishing Scams ,
Power Grid ,
Privacy Laws ,
Ransomware ,
Regulatory Agenda ,
State and Local Government ,
Technology Sector ,
Terrorist Threats ,
Text Messages ,
Threat Management ,
Tracking Systems ,
Unsolicited Advertisements
EU and U.S. Agree to New Data-Sharing Pact, Offering Some Respite for Big Tech
“For over a year, officials on either side of the Atlantic have been hashing out a deal to replace the so-called Privacy Shield.”
Why this...more
CFPB Takes Action to Protect the Public from Shoddy Data Security Practices
"The bureau said the circular does not suggest that particular security practices are specifically required under the Consumer Financial...more
9/7/2022
/ Blockchain ,
Consumer Financial Protection Act (CFPA) ,
Consumer Financial Protection Bureau (CFPB) ,
Cryptocurrency ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Security ,
Financial Institutions ,
Non-Fungible Tokens (NFTs)
CHIPS and Science Act Will Lower Costs, Create Jobs, Strengthen Supply Chains, and Counter China
"Spurred by the passage of the CHIPS and Science Act of 2022, companies have announced nearly $50 billion in additional...more
The Cryptocurrency Revolution and President Biden's Formal Recognition -
Out of the ashes of the 2008 financial crisis, Bitcoin sprang up like an insurgency, targeting both the unbridled activity of large financial...more
3/18/2022
/ Bitcoin ,
COPPA ,
CRISPR ,
Cryptocurrency ,
Cyber Attacks ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data Protection ,
FinTech ,
Food and Drug Administration (FDA) ,
Hackers ,
Intellectual Property Protection ,
Internet of Things ,
Medical Devices ,
Securities and Exchange Commission (SEC)
Nature of Patents and Patent Rights -
When a patent is issued under the seal of the United States Patent and Trademark Office, it is signed by the Director of the USPTO or an Office official. The patent contains a grant...more
10/28/2021
/ Amazon ,
Cryptocurrency ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Department of Justice (DOJ) ,
Facebook ,
False Claims Act (FCA) ,
Federal Contractors ,
Medical Devices ,
Nanotechnology ,
Patent Litigation ,
Patents ,
Retailers ,
Starbucks ,
USPTO