News & Analysis as of

Authentication

FBT Gibbons LLP

The Authority Problem: When Does an Authorized Agent Become an Unauthorized Buyer?

FBT Gibbons LLP on

If agentic commerce is going to work at scale, the market has to solve more than authentication, aka the “identity problem,” as we posited in part two of this series exploring the six fault lines of agentic commerce....more

HaystackID

[Webinar] When Seeing Isn’t Believing: Deepfakes, Digital Evidence, and Proving Authenticity in the Age of AI - April 22nd, 11:00...

HaystackID on

Artificial intelligence has fundamentally changed the reliability of digital media as evidence. Images, video, and audio, once treated as inherently trustworthy, can now be convincingly fabricated using GenAI and deepfake...more

Offit Kurman

Will‑Challenge Litigation: Forensic Expert Cross‑Examination

Offit Kurman on

Estate litigation rarely turns on a single moment, but an effective cross‑examination of the other side’s forensic document examiner may be one’s best shot at that “Perry Mason moment.” ...more

Sheppard, Mullin, Richter & Hampton LLP

Banksy Unveiled: Exit Through the Auction House

A recent 8,000-word investigation by Reuters reignited one of the art world’s most persistent questions: who is Banksy? Drawing on court filings, police records, witness statements, travel data, and archival sources, the...more

EDRM - Electronic Discovery Reference Model

When the Agent Goes Off-Script: Meta’s AI-Triggered Data Exposure Revives Old Security Fears

ComplexDiscovery Editor’s Note: Meta’s consecutive AI agent incidents — an inbox takeover in February and a sev‑1–grade data exposure in March — mark a turning point for professionals across cybersecurity, information...more

EDRM - Electronic Discovery Reference Model

Evidence Sufficient to Demonstrate that Audio Recording Was Not a Deepfake

In Burnley v. Valentin, 2026 WL 767145 (E.D. Va. Mar. 18, 2026), the proponent of an audio recording survived a challenge that it was a deepfake. Burnley involved two motions to enforce settlement agreements....more

DLA Piper

Australia’s Social Media “Ban” and the eSafety Commissioner’s Social Media Minimum Age Regulatory Guidance

DLA Piper on

Australia’s world-first social media “ban” has been in the global spotlight since its introduction in late 2025. As other jurisdictions look to follow suit, parents and tech giants alike continue to grapple with a key...more

Sheppard, Mullin, Richter & Hampton LLP

When AI Clicks “Pay”: The Emerging Compliance Risks of Agentic Commerce

AI-driven “agentic commerce” is no longer theoretical. Today’s AI assistants can already search for products, compare options, populate shopping carts, check out, initiate payment, and make returns, all on behalf of a person...more

Cooley LLP

Navigating the Age Assurance Maze: FTC Signals Potential Guidance on Harmonizing COPPA With Robust Age Assurance Technologies

Cooley LLP on

On January 28, the Federal Trade Commission (FTC) hosted a workshop on age assurance, where FTC leadership signaled new guidance may be forthcoming to clarify potential conflicts between age assurance efforts and federal law....more

Perkins Coie

Arizona District Court Underscores the Importance of Robust E-Signature Authentication for Enforcing Arbitration Agreements

Perkins Coie on

In Parrish v. Vulcan Materials Company, 2025 WL 2710407 (D. Ariz. Sep. 23, 2025), the U.S. District Court for the District of Arizona granted an employer’s motion to compel arbitration, holding that a valid arbitration...more

Robinson+Cole Data Privacy + Security Insider

Single Sign-On Services Targeted in Vishing Attacks

We continue to alert our readers to the uptick and successful use of vishing attacks against companies. Threat actors continue to be creative in developing strategies to use vishing to gain access into systems....more

Freeman Mathis & Gary

Objection SustAIned: Artificially Generated Evidence Makes its Way into the Courtroom

Freeman Mathis & Gary on

Odds are, you’ve caught yourself doing it: you see something so outrageous online that it couldn’t possibly be true (could it?), and your gut reaction is to brush it off as a product of artificial intelligence. Heightened...more

EDRM - Electronic Discovery Reference Model

[Webinar] Truth on Trial: How to Detect and Challenge Deepfake Evidence in the AI Era - January 22nd, 1:00 pm - 2:00 pm ET

AI has made it easier than ever to fabricate convincing documents, images, audio, and video which is creating a new generation of evidence that can mislead courts, opposing counsel, and clients....more

Wiley Rein LLP

Updates to NIST Cybersecurity Guidance Show Continued Focus on Cloud Services

Wiley Rein LLP on

Recent draft cybersecurity guidance from the National Institute of Standards and Technology (NIST) provides an opportunity for government contractors who provide IT services to federal agencies to weigh in on implementation...more

HaystackID

Satisfying ESI Evidence Rules and Admissibility Standards

HaystackID on

Editor’s Note: Identifying key digital evidence is only half the battle—ensuring that evidence is admissible in court is what ultimately matters. This article examines the legal standards that govern whether electronically...more

Mayer Brown

Malaysia's Proposed Social Media Ban for Children: How It Compares with Australia and Singapore

Mayer Brown on

Malaysia plans to ban children under 16 (“Under-16s”) from having social media accounts beginning in 2026. The proposal, part of a wider Online Safety Act expected to start on 1 January 2026, foreshadows the implementation of...more

Foster Garvey PC

Understanding BIMI: Protecting Your Brand in the Inbox

Foster Garvey PC on

With the constant stream of email spoofing and phishing attempts in consumer’s inboxes, recipients increasingly struggle to distinguish legitimate emails from fraudulent ones. Brand Indicators for Message Identification...more

Epstein Becker & Green

The Rising Threats of Multi-Modal and Agentic AI in Cyber Attacks

Epstein Becker & Green on

The digital transformation has led to significant advancements in authentication and identity verification technologies and other cyber defenses. From biometrics to multi-factor authentication (MFA) to use of Artificial...more

Cooley LLP

FCC Proposes Requiring Caller Identification for Authenticated Voice Calls

Cooley LLP on

As part of its effort to combat robocalls, the US Federal Communications Commission (FCC) has opened a new rulemaking to consider whether and how to require companies carrying those calls to provide information identifying...more

Wiley Rein LLP

FCC Proposes Tougher Standards for Call Labeling and Foreign-Originated Calls

Wiley Rein LLP on

On October 28, 2025, the Federal Communications Commission (FCC) voted 3-0 to adopt a Ninth Further Notice of Proposed Rulemaking (FNPRM) in its Advanced Methods to Target and Eliminate Unlawful Robocalls and Call...more

Wiley Rein LLP

Fraud and Scam Prevention Series: FCC’s Robocall Regulations Are Complex and Unrelenting – Voice Service Providers Need to Stay...

Wiley Rein LLP on

In this second installment of Wiley’s series on fraud and scam prevention, we focus on the Federal Communications Commission’s (FCC) continued regulatory and enforcement efforts on illegal and unwanted robocalls. Since...more

Katten Muchin Rosenman LLP

Economic Crime and Corporate Transparency Act 2023 — Identity Verification and Companies House Filings (2025 Update)

The Economic Crime and Corporate Transparency Act 2023 (ECCTA) is reshaping UK company administration. Aimed at preventing the misuse of UK corporate structures, improving the reliability of the public register and tackling...more

HaystackID

[Webcast Transcript] Detecting the Undetectable: Deepfakes Under the Digital Forensic Microscope

HaystackID on

Editor’s Note: Deepfake technology forces us to confront an uncomfortable truth: our eyes and ears can no longer be trusted in the digital realm. HaystackID’s recent webcast explored how synthetic media has evolved from a...more

Mintz - Technology, Communications & Media...

Telephone and Texting Compliance News — July 2025

We are pleased to present our latest edition of Telephone and Texting Compliance News, providing insights and news related to the Telephone Consumer Protection Act (TCPA)....more

Hogan Lovells

Singapore censures use of national identification numbers for authentication

Hogan Lovells on

On 26 June 2025, Singapore’s Personal Data Protection Commission (PDPC) and Cyber Security Agency (CSA) released a joint statement advising organizations to stop “as soon as possible” the practice of using Singapore national...more

207 Results
 / 
View per page
Page: of 9

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide