News & Analysis as of

Data Collection Risk Management Privacy Concerns

J.S. Held

Data Privacy for the Future: Strategies to Limit Digital Risk and Liability

J.S. Held on

Your perspectives and perceptions towards a problem drive your approach to solving that problem. Managing data privacy challenges are no different. Therefore, to address today’s issues, it is a worthwhile exercise to review...more

Littler

Developing a Global Data Protection Framework for Artificial Intelligence in the Workplace

Littler on

As employment-related artificial intelligence (“AI”) tools proliferate, multinational employers feel increasing pressure to deploy AI across their global offices.  These tools can provide great value and efficiency across the...more

Foley Hoag LLP - Security, Privacy and the...

Key Considerations for Health App Developers from the FTC

If your company creates health-related apps, the Federal Trade Commission (FTC) has set out some key considerations: - Make accurate representations. Clearly explain how people’s information will be used and shared and then...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #202 – Check the Privacy Settings on Your Phone Frequently

I once again had the pleasure of presenting Cybersecurity for Tax Professionals at the IRS Nationwide Tax Forum today. The conference is designed for tax professionals in small- to medium-sized businesses....more

Hanzo

Looking Back, Moving Forward: Hanzo's 2018 Review and 2019 Predictions

Hanzo on

With 2018 in the archives, Hanzo is starting off the new year with a look ahead to the trends and challenges we believe will define the compliance and eDiscovery landscape in 2019, and a look back at the year that was at...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - October 2017 #3

Robinson & Cole LLP on

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more

K2 Integrity

Cybersecurity Awareness: Limiting Your Exposure and Visibility

K2 Integrity on

We spend so much time on our mobile phones and on social media, yet often we don’t think of how these tools are broadcasting our lives as we work and play. With just a few steps, you can limit what you are digitally telling...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide