Why Privacy is Your Secret Weapon Against Third-Party Risk
AI Discrimination and Emerging Best Practices – Part 1 — The Good Bot Podcast
How can founders navigate the explosion of state AI regulations?
#WorkforceWednesday®: New DOL Guidance - ERISA Plan Cybersecurity Update - Employment Law This Week®
What's the Tea in L&E? Can You Share An Employee's Medical Info?
New HIPAA Final Rule: Key Changes to Reproductive Health Care Privacy - Thought Leaders in Health Law®
The Privacy Insider Podcast Ep. 7: David, Goliath, and Data Privacy Part II: Max Schrems
AGG Talks: Women in Tech Law Podcast - Episode 4: Preparing for a Transaction? What Emerging Growth Companies Need to Know
The CMS Interoperability and Prior Authorization Rules
When AI Meets PI: Assessing and Governing AI from a Privacy Perspective
John Wick - What You Need To Know about the Corporate Transparency Act
Seeing into the Future: Moving Beyond AI to Visual Intelligence with Oculi CEO Charbel Rizk
A Brief Overview of Colorado’s Recently Enacted AI Law
Navigating Emerging Privacy Issues in Financial Services — The Consumer Finance Podcast
No Password Required: USF Cybercrime Professor, Former Federal Agent, and Vintage Computer Archivist
AGG Talks: Women in Tech Law Podcast - Episode 3: Cybersecurity and FCA Compliance: Essential Insights for Tech Leaders
Back to School: 3 Essential Employee Trainings
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
Implications of the SEC Cybersecurity Disclosure Rule
By now, companies across all industries have become familiar with the lifecycle and stages of a ransomware incident. Generally, once an attack is contained, remediation and rebuilding will follow. Shortly after, the crisis...more
As more organizations across industry sectors store personal data with cloud storage vendors— including the three largest vendors in the world, Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform—federal...more
On September 24, 2024, the State Council released the Regulations on the Management of Network Data Security (《网络数据安全管理条例》) (“Regulations”). The Regulations focus on prominent issues related to Personal Information (PI),...more
The deadline for EU countries to transpose the expanded cybersecurity directive, NIS 2, into national law is 17 October 2024, but the implementation status varies significantly from country to country. Some of the member...more
The German Federal Court of Justice (Bundesgerichtshof), tasked with resolving a conflict between two competing pharmacists, sought guidance from the Court of Justice of the European Union ("CJEU") on interpreting the General...more
This month is the 21st annual Cybersecurity Awareness Month, cosponsored by the Cybersecurity and Infrastructure Agency (CISA) and the National Cybersecurity Alliance. This year’s theme is “Secure Our World,” continuing what...more
In today’s digital landscape, many organizations may face the unfortunate reality of a data breach. This second installment of a five-part series on employee data privacy will explore the key areas of risk that human...more
On October 7, 2024, the European Data Protection Board (“EDPB”) adopted an opinion on obligations following from the use of processors and sub-processors (the “Opinion”). The EDPB is the body that seeks to ensure harmonised...more
On September 22, 2024, a new individual right to data portability came into force under Quebec’s privacy legislation applicable in the private sector (the Act respecting the protection of personal information in the private...more
The Federal Communications Commission (FCC) has announced new effective dates for amendments to rules under the Telephone Consumer Protection Act (TCPA) aimed at strengthening consumer protections against robocalls and...more
On October 11, 2024, the Federal Communications Commission announced that the effective date for Telephone Consumer Protection Act (TCPA) rules on revoking consent for unwanted robocalls and robotexts is set for April 11,...more
When one hears the term “neural data,” a brain implant comes to mind, alongside concerns about these neurotechnologies being able to read our innermost thoughts. Generally, implantable devices such as these are considered...more
On October 3 and 4, the competition authorities of the G7, including the US Federal Trade Commission (FTC) and Department of Justice’s (DOJ) Antitrust Division, participated in a summit on AI competition challenges. The...more
It has been a busy month for cyber and privacy regulation in Australia. On the heels of the proposed amendments to the Privacy Act 1988 released just under a month ago, three further draft Bills relating to cyber security...more
As part of the latest developments regarding the personal data protection regulations in the Kingdom of Saudi Arabia ("KSA"), the Saudi Data and Artificial Intelligence Authority ("SDAIA") issued the Regulation on Personal...more
Following in the footsteps of Nebraska, the Attorneys General of North Carolina, California, and New Jersey filed complaints against TikTok and its owner, ByteDance, Ltd., on October 8, 2024....more
INTRODUCTION - In August 2024, the Hong Kong Office of the Privacy Commissioner for Personal Data (“PCPD”) released a revision of the “Code of Practice on the Identity Card Number and other Personal Identifiers: Compliance...more
Reminders about the need for an eye exam do not always fall within the health care provider exemption of the Telephone Consumer Protection Act (TCPA) regulations, a federal court in Florida recently held....more
This week, Marriott International, Inc. and its subsidiary Starwood Hotels & Resorts Worldwide LLC (collectively, Marriott) agreed to settle on the terms of a settlement order with the Federal Trade Commission (FTC) for its...more
INTRODUCTION - The acceleration of the rate of cyber-attacks against companies in Hong Kong in the last year or so (with over 60 notifications of such attacks being received by the Office of the Privacy Commissioner of...more
A new report published by the software company Egress this month, Phishing Threat Trends Report, is a must-read. It outlines the proliferation of phishing toolkits on the dark web (that basically allows any Tom, Dick, and...more
On this episode of “Don’t Take No for An Answer,” Lynda A. Bennett, Chair of Lowenstein’s Insurance Recovery Group, speaks with David Anderson, Vice President of Cyber at Woodruff Sawyer, about the difference between...more
The U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) recently settled two ransomware cases with covered entities. These cases signal the government's growing concern with health care...more
A recent California False Claims Act (CFCA) settlement highlights how relators are turning to artificial intelligence (AI) tools to allege fraud and other issues. By understanding how AI may be used by relators or other...more
As we settle into spooky season, let’s take a minute to consider a recent development in health care privacy as we ask ourselves, is this a trick or a treat?...more