Latest Publications

Share:

Avoiding growing pains in the development and use of digital twins

Novel technologies that seek to improve quality of life or simplify complex processes offer great promise. For example, medical technologies that detect or cure disease or supply chain technologies that allow for real time...more

Phishing Subpoenas – A New Privacy Threat?

Privacy issues are inherent in almost all facets of a business — from operations, employment, and technology to customer service, contracts, legal and compliance — all with varying degrees of risk. Most companies mitigate...more

Can Privacy Be Bought? How Scrutiny of Meta’s Subscription Model Has Wider Implications –PART II

In Part I, we discussed the European Commission’s (“Commission”) disapproval of Meta’s “pay or consent” subscription model. In Part II, we delve into the European Commission’s findings, prior findings by the European Data...more

Can Privacy Be Bought? How Scrutiny of Meta’s Subscription Model Has Wider Implications – PART I

In November of 2023, Meta launched a service in the European Union that allowed users to utilize the Facebook and Instagram platforms “ad free” for a monthly fee. The subscription service was meant to address regulatory...more

FTC Bureau of Consumer Protection Remarks Compare Lessons Learned from Consumer Credit as a Model for Regulating Privacy

In the middle of the 20th century, there was a massive expansion of the retail credit market. Everything from boats to sewing machines to kitchen appliances were bought and sold through increasingly complex credit...more

Ninth Circuit Upholds Arbitration in Data Breach Case: A Reminder for Businesses on the Importance of Terms and Conditions

The frequency of class actions related to data breaches has significantly increased, with no indication that this upward trajectory will plateau. This raises the question: Are there more efficient alternatives to settling...more

Data Breach 911: Five Immediate Steps to Take

For many, responding to an incident feels chaotic — questions swirling, uncertainties piling up, and no clear direction. Even when prepared with a well-rehearsed incident response plan, a data security incident places a...more

Cybersecurity Awareness Month: A Basic Primer to Keep Your Data & Information Safe

As Cybersecurity Awareness Month comes to an end and the spooky season of Halloween is upon us, no one wants to live through a cybersecurity horror story. There are some simple precautions every business and household can...more

Navigating Data Ownership in the AI Age, Part 2: Frameworks Governing Data Ownership

The proliferation of AI-derived and processed data in the era of big data is occurring against a complex backdrop of legal frameworks governing ownership of and responsibilities with regard to that data. In a previous...more

Navigating Data Ownership in the AI Age, Part 1: Types of Big Data and AI-Derived Data

The emergence of big data, artificial intelligence (AI), and the Internet of Things (IoT) has fundamentally transformed our understanding and utilization of data. While the value of big data is beyond dispute, its management...more

Technological and Legal Defenses Against Privacy Attacks on Machine Learning Models

Machine learning (ML) models are a cornerstone of modern technology, allowing models to learn from and make predictions based on vast amounts of data. These models have become integral to various industries in an era of rapid...more

How Smart Is Your Artificial Intelligence Policy?

There is a great YouTube video that has been circulating the internet for half a decade that reimagines a heuristically programmed algorithmic computer “HAL-9000” as Amazon Alexa in an iconic scene from “2001: A Space...more

California Takes the Wheel: A Closer Look at Privacy in Connected Vehicles

California, home to the highest number of registered vehicles in the U.S., is at the forefront of a critical issue – the privacy practices of automobile manufacturers and vehicle technology firms....more

How a Zero-Day Flaw in MOVEit Led to a Global Ransomware Attack

In an era where our lives are ever more intertwined with technology, the security of digital platforms is a matter of national concern. A recent large-scale cyberattack affecting several U.S. federal agencies and numerous...more

Complying With the FTC's Amended Safeguards Rule

Cybersecurity is a looming threat for most businesses. The impact of a major cyber event can resonate for weeks, months, and even years after the initial attack. To mitigate the risks to consumers, there have been several...more

Have You Heard of ADCONs? How to Get Ready for Fannie Mae and Freddie Mac’s New Address Confidentiality Program Requirements

In July of this year, Fannie Mae announced an update to the Agency’s Seller and Servicer Guidelines to include requirements that mortgage loan sellers and servicers comply with state address confidentiality programs (ADCONs),...more

California Announces Increased Scrutiny on CCPA Violations with Latest $1.2 Million Enforcement Action Settlement

California’s Attorney General Rob Bonta has made clear that California Consumer Privacy Act (CCPA) enforcement is going to be a priority for the AG’s office. On Friday, the California AG’s office announced a $1.2 million...more

How Not to Make a Deal: 5 Key Cybersecurity Concerns in M&A

Cyber risks are increasing, and as a result, due diligence inquiries and valuations are increasingly focusing on the cybersecurity and privacy risks inherent in a business’s collection, use, retention and disposal of...more

What to Expect When You’re Expecting a Biometric Class Action: Settlements

Biometric class actions have proliferated in recent years — and with more states eyeing comprehensive data privacy legislation, companies that use biometric data should plan for the surge to grow. With rare exceptions, these...more

Cyber Defense: Erin Illman on the 5 Things Every American Business Leader Should Do To Shield Themselves From A Cyberattack

Thank you so much for joining us in this interview series! Before we dig in, our readers would like to get to know you. Can you tell us a bit about how you grew up? I grew up in a small town of about 3,500 in rural North...more

Preparing for the Tidal Wave and Bracing for the Tsunami: Utah Becomes the Fourth State to Pass Privacy Legislation

At last count, at least 39 states have introduced (or passed) comprehensive privacy legislation. After what was previously a watch-and-wait game of legislative whack-a-mole, we are now seeing this legislation get passed and...more

ALERT: New State Privacy Requirements for Mortgages Funded After December 1, 2021

As of yesterday, any new Freddie Mac mortgage funded will need to comply with state Address Confidentiality Program (ACP) requirements. ACPs are state-sponsored programs designed to protect victims of crimes such as domestic...more

12/3/2021  /  Freddie Mac , Mortgages

After (Another) Unusual Year, We’re Very Thankful and Wish You a Happy Thanksgiving

Now that the pandemic’s “social distancing” is lessening, we hope you are all able to gather with friends and family this Thanksgiving. As we do the same, we wanted to count our blessings as we review the year. This year, we...more

A Fintech Leader’s Thoughts on the North Carolina Regulatory Sandbox Act

As part of Bradley’s continuing coverage of the North Carolina Sandbox Act, we wanted to know what community members and NC fintech aficionados thought about this proposed legislation. We posed six questions to Tariq Bokhari,...more

What the Proposed North Carolina Regulatory Sandbox Could Mean for Fintech and the Financial Services Community

Technology is booming and financial technology (“fintech”) is advancing society in new and innovative ways. In 2021 alone, North Carolina has been the target for some very high-profile technology announcements, including...more

91 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide