Latest Publications

Share:

Legislation Requiring Reporting of Certain Cyber Incidents Enacted

President Biden has signed into law the Consolidated Appropriations Act of 2022 (2022 CAA), which includes the Cyber Incident Reporting for Critical Infrastructure Act (Cyber Incident Reporting Act). The Cyber Incident...more

Russian War Affects Tech and IP

Russia initiated a full-scale invasion of one of its sovereign neighbors and the Western world has responded with censure and fury. Our governments and financial institutions have cut off Russian access to money....more

[Webinar] Moving Targets While Under Fire – Aligning with New Data Laws While Hackers and Customers Bring Pressure - April 5th,...

In the past 5 years businesses felt the increasingly intricate data management rules (GDPR, CCPA, BIPA) pressed against an explosion in hacking and ransomware. Companies experience pressure from legislators, regulators,...more

State Laws Shift Geolocation’s Spot On The Privacy Map

Where are you? Your exact location is a tidbit of information that can infringe on your privacy. Knowing your location all the time can help someone map your life....more

Initiating Action With Only Brain Power

Every couple of years I revisit the advancement of brainspray capture techniques - technology that allows people to direct movement or thoughts with only brain activity. The progress in the past two years has been impressive....more

Countdown to State Law Privacy Compliance: 10 Months to Go | New Rules for Sensitive Personal Data

As noted in our intro alert for this series, new omnibus privacy laws are coming to Virginia and Colorado and California’s existing comprehensive privacy law has been further modified by the CPRA. Don’t wait to implement your...more

GDPR Privacy Rules: The Other Shoe Drops

Four years after GDPR was implemented, we are seeing the pillars of the internet business destroyed. Given two new EU decisions affecting the practical management of data, all companies collecting consumer data in the EU are...more

Illinois Prohibits Police Use of Household Electronic Data Without Warrant

The smart house is upon us. One may be surrounding you now, with internet-enabled security systems, doorbells, air conditioner, refrigerator, mattress, windows, music speakers, and children’s toys. ...more

The Core Tradeoff: Privacy or Security?

US policy makers struggle with the tension between protecting personal privacy and enabling law enforcement surveillance. We know that both are important, but at a certain point, prioritizing one priority shortchanges the...more

Countdown to State Law Privacy Compliance: 11 Months to Go

This article starts the 11-month countdown to develop business compliance strategies for three new omnibus privacy laws coming in 2023: January 1: the California Consumer Privacy Rights Act (which amends the existing CCPA)...more

Recreational DNA Industry May Take Liberties With Consumer Data

Companies collecting consumer DNA for non-medical purposes seem to be playing fast and loose with their customers’ data, according to a well-regarded consumer watchdog. This category of private money makers, which could...more

Why is Norton Anti-Virus Becoming a Crypto Mining Botnet?

In the before-times – the heady days of 2017 when the prices of both Bitcoin and Ethereum skyrocketed and seemed immune to gravity – several well-known companies boosted their value by claiming to build new products on the...more

Life and Death of Technology: 2022

Everything has a life cycle. Bacteria, insects, people, civilizations, galaxies - all are born, live and pass into eternity eventually. So it goes with technologies....more

Is Accountability Even Possible?

How can we allow open access to sophisticated tools that can attack anyone’s phones undetected? It seems like creating tools that can only be used for illegal and immoral purposes should be banned by society. ...more

New Privacy Paradigm Time

Why don’t our new privacy laws really protect our privacy?  Are we going about this the wrong way? The topic was raised in the recent Capital Forum of state and federal enforcement agencies by FTC Chair Lena Kahn, who...more

How Perfect Will AI Need to Be?

Humans are working artificial intelligence programs (AI) into business, government and daily life. Like with any new tool or technology, we start to see the initial technology flaws the more we are exposed to it....more

Hidden Threats of Exposing Your Phone Number

This week I read a worried headline claiming that, in a recent consumer data breach, the hackers had managed to access consumers’ telephone numbers. This was treated as an important and troubling revelation....more

Pick Your Poison

How would you prefer to be manipulated? If we weight your social media feed on what we know you like to see, then you will be showered with commercial clickbait. If we weight your social media feed by what is likely to spark...more

California and Florida Introduce Two More Genetic Privacy Laws Into the Mix

Florida and California join a growing minority of states enacting laws protecting a person’s genetic information (Nevada and Alaska also have laws). Florida’s new genetic privacy law, known as Protecting DNA Privacy Act, went...more

To Sleep, Perchance To Dream of Coors Beer and Halo 2

We have all heard of targeted advertising, but what about advertising that targets your dreams. US companies have begun programs to insert their products into your sleep cycle - to set the agenda of your dreams....more

Hacking Is Changing: Should Our Data Security Change?

In meetings with data security professionals, the same topic tends to arise: Why are we fighting the same security battles now that we fought 20 years ago? The history of network and cyber security seems to be a...more

News Scan Finds Multiple Threats to Your Privacy

Your personal information is threatened by more pernicious tools and attacks each year. While this blog often describes poorly written privacy laws stifling business and dangerous bureaucratic overreach by privacy...more

Voice Analysis Complicates Personal Privacy

Most biometric readings require your presence in the same space as the measuring tools.  Facial recognition, retinal capture, fingerprints or hand geometry, even biomarked scents are measured in close physical proximity. The...more

[Webinar] Technology and Data Management: A Primer for Lawyers - October 11th, 12:00 pm - 1:00 pm EDT

Join Womble Bond Dickinson for our Lunch & Learn CLE Specialty Series! This webcast will offer a program focused on technology....more

Why Data Security and Legal Should Be Friends

Within a corporation, teams jockey for resources and promote their roles within the enterprise. It sometimes seems like important parts of the company are working at cross-purposes....more

199 Results
 / 
View per page
Page: of 8

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide