A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
EEO-1 Filing After June 4: What to Do Now, and How to Prepare for Next Year - Employment Law This Week®
Navigating State Privacy Laws
[Webinar] You Are Here: First Steps in Data Mapping
An Ounce of Prevention: Keys to Understanding and Preventing AI and Cybersecurity Risks
Calculating eDiscovery Costs: Tips from Brett Burney
State AG Pulse | Content moderation vs. free expression
Work This Way: A Labor & Employment Law Podcast | Episode 14: How Employers Can Navigate Cybersecurity Issues with Brandon Robinson, Maynard Nexsen Attorney
Navigating the Digital Frontier: Employee Privacy Rights and Legal Obligations in the Modern Workplace
DE Under 3: OMB Announced Finalized Overhaul to Federal Race & Ethnicity Data Collection Standards
Embracing Data Privacy to Drive Business Growth: On Record PR
Work This Way: A Labor & Employment Law Podcast - Episode 6: Digital Forensics & Protecting Trade Secrets with Clark Walton
PODCAST: Williams Mullen's Trending Now: An IP Podcast - U.S. State Data Privacy Update
Managing Large Scale Review Efficiency: Tips From a GC
AD Nauseam – Children, They are Indeed Our Future – COPPA Developments
1071 Rule Status — The Consumer Finance Podcast
Data Dividend: What is Personal Data Worth?
The Great Link Debate and the Future of Cloud Collaboration
RegFi Episode 9: Consumer Data Collection and Usage with Eric Ellman
In this month's edition, we examine the Swiss data protection authority's comments on the validity of its data-sharing framework with the U.S., as well as the European Data Protection Board's guidance on joint controllers and...more
Protection of industrial control systems is crucial to the security of our country. The National Cybersecurity Center of Excellence (NCCoE) has announced a project for which it is seeking comment: Detecting and Protecting...more
The National Security Agency (“NSA”) announced that it will voluntarily stop collecting the email and text exchanges of American citizens with persons overseas that mention a target of NSA surveillance. Although the...more
On Tuesday, January 10, 2017, in his confirmation hearing before the Senate Judiciary Committee, Senator Jeff Sessions, (R., AL), the president-elect’s nominee to lead the Department of Justice (DOJ), said that he intends to...more
A major European court has just pulled the rug out from under nearly 5,000 US companies, snatching away the relative business certainty of the Data Transfer Safe Harbor, and maybe the safety of standard contract clauses and...more
On October 6, 2015, the European Court of Justice (CJEU) invalidated the US-EU Safe Harbor framework, effective immediately. This momentous decision jeopardizes the continued flow of data from Europe to the US. As the Safe...more
Third Circuit Affirms FTC’s Authority Over Cybersecurity: In the Wyndham case, the Third Circuit affirmed that the FTC has the authority to regulate cybersecurity under Section 5 of the FTC Act, and that the language of...more
Not long after striking down the National Security Agency’s telephone surveillance program in ACLU v. Clapper, the Second Circuit is asking the parties to assess whether recently passed federal legislation has rendered the...more
The recent showdown over renewal of certain provisions of the USA Patriot Act (often called simply the Patriot Act) and the subsequent enactment of the USA Freedom Act have raised a number of questions about the ongoing...more
On Tuesday, June 2, 2015, Barack Obama signed the USA FREEDOM Act into law. Among other reforms, the USA FREEDOM Act adopts a series of modifications to federal foreign intelligence gathering statutes and procedures to...more
Section 215 of the Patriot Act expires today. Section 215 addresses the Federal Bureau of Investigation’s ability to gather business records. In 2006, after passage of amendments to the Patriot Act, the Bush administration...more
Fast approaching is the June 1 expiration of certain provisions of the Patriot Act, including § 215 (codified as 50 U.S.C § 1861), which is the basis for the National Security Agency’s (NSA) bulk telephone metadata collection...more
Whatever your opinion of Edward Snowden, the shockwaves from his leaks of classified material continue to roil all three branches of the federal government. The latest wave broke last week when the United States Court of...more
On June 25, 2014, the U.S. Supreme Court issued one groundbreaking opinion in two cases regarding cellphone searches incident to arrest. In a unanimous opinion, the court held that under the Fourth Amendment, police must...more
Earlier this month the Ninth Circuit Court of Appeals became the third federal appellate court this year to hear argument on the legality of the NSA’s bulk collection of telephone metadata....more
It seems scarcely a week goes by without a headline blaring news of a major cybersecurity breach. And with ongoing revelations about the data-tracking activities of the National Security Agency, the public isn’t growing less...more
Recent revelations concerning the activities of the National Security Agency (“NSA”) include reports that the NSA and other government agencies have – in secret – routinely collected in bulk the “metadata” associated with...more
Rapper Jay Z and his sister-in-law reminded us this week that, prior to revelations about NSA data collection efforts, it was the lives of the rich and famous that often sparked debate about privacy in our country....more
1. Costa Rica - On March 5, 2013, Costa Rica’s data protection law, originally passed in 2011, came into force. The law, the Ley Protección de la Persona frente al tratamiento de sus datos personales, Law...more
On October 25, 2013, the European Council concluded that the new Data Protection Framework should be adopted in a timely manner in order to strengthen consumer and business trust in Europe’s digital economy. The Council did,...more