News & Analysis as of

Data Mining Today's Popular Updates

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

Houston Harbaugh, P.C.

Will Cryptocurrency and Data Mining Add New Complexity to Oil & Gas Zoning?

Houston Harbaugh, P.C. on

Questions about the zoning of oil and gas development operations have persisted in Pennsylvania for years. Now, cryptocurrency and data mining operations may create new wrinkles in long-running disputes about oil and gas...more

Nextpoint, Inc.

Managing Ediscovery In The Cloud: Practical, Ethical and Technical Considerations For Lawyers

Nextpoint, Inc. on

In this excerpt from our white paper on managing ediscovery in the cloud, we explain the basics of the cloud and its biggest benefits in ediscovery. Click here to download the full white paper. As early pioneers of cloud...more

Rothwell, Figg, Ernst & Manbeck, P.C.

Will Divergent Copyright Laws Between the US and UK Influence Where You Do Business as an Artificial Intelligence Company?

Spurred by the vast potential of artificial intelligence (AI) and machine learning (ML) technologies, many countries are evaluating whether existing legal frameworks for intellectual property (IP) protection are adequate or...more

HaystackID

[Webcast Transcript] Data Mining in Incident Response: Managing Risk and Spend through an Effective Evidence-Based Approach

HaystackID on

Editor’s Note: On August 31, 2022, HaystackID shared an educational webcast on the topic of data mining in data breach incident response. As data mining has increasingly become one of the largest expenses during a cyber...more

A&O Shearman

Mexico Nationalizes Lithium Mining

A&O Shearman on

Over the last year, several Latin American countries, including Chile, Peru and Mexico, have discussed various measures that, if adopted, could materially affect the mining, energy and natural resource sectors. Shearman &...more

Eversheds Sutherland (US) LLP

Stake your claim: Taxpayers claim the creation of cryptocurrency is akin to baking a cake and non-taxable

In a US District Court complaint filed May 26, 2021, a married couple is seeking a refund of taxes they paid on cryptocurrency tokens the husband created, asserting that current law does not permit the treatment of created...more

King & Spalding

ESG Impact Watch: Blockchain

King & Spalding on

Blockchain technology is increasing in popularity across industries but, in its current iteration, triggers significant environmental, social, and governance (ESG) considerations. As the financial services sector...more

Rosenberg Martin Greenberg LLP

The Crackdown on Cryptocurrency

We all read the headlines. Virtual currencies are a hot button topic. Even Facebook is developing their own virtual currency. It is easy to understand the attraction. The use of a virtual currency is anonymous. Account...more

Snell & Wilmer

Has Your Computer Been Hijacked For Illicit Cryptocurrency Mining?

Snell & Wilmer on

Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more

Foley & Lardner LLP

Sharing and Mining Patient Data in Digital Health and Telemedicine: Laws You Need to Know

Foley & Lardner LLP on

The use of new technologies such as digital health applications, telemedicine, and information exchanges can provide game-changing benefits for providers and patients alike. However, with increased sharing comes increased...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Hacking Your Vote From Inside Your Head: How Cambridge Analytica Altered Reality Via Social Media To Induce Specific Voting...

We learned some important lessons this week about the dangers inherent to losing control of your customer or client data, either through hacking, internal theft, or poorly designed controls over what your business associates...more

Thomas Fox - Compliance Evangelist

Day 19 of One Month to More Effective Continuous Improvement-Use of Social Media for Continuous Improvement

Compliance does not exist in a time-warp vacuum, with programs living in 1977 when the first major anti-corruption legislation, the Foreign Corrupt Practices Act was passed. The law has advanced since that time, as has...more

Burr & Forman

Public Mining of Securities Regulatory Big Data

Burr & Forman on

An article in this weekend’s Wall Street Journal called for FINRA to make the database underlying its BrokerCheck® system (of reports on stockbroker registration and disciplinary history) more widely available for data mining...more

Franczek P.C.

Is Google Illegally Spying On Your Students? New FTC Complaint Says It Is

Franczek P.C. on

Google Apps for Education has recently come under fire with a Federal Trade Commission complaint filed by a nonprofit organization, Electronic Frontier Foundation. In a press release issued last week, EFF claims that Google’s...more

BakerHostetler

BakerHostetler Partner Alan Friel Talks Big Data and Data Collection

BakerHostetler on

Alan Friel, Partner with BakerHostetler's Privacy and Data Protection team, talks about compliance programs for companies, consumer data collection, misrepresentation, and data security deficiencies....more

Carlton Fields

The Big Deal About Big Data: What Life Insurers Must Know

Carlton Fields on

Big data and predictive analytics, which forecast future outcomes based on past occurrences, allow companies to examine large stores of data and uncover patterns that can be used to gain a competitive advantage. Long-used in...more

Nossaman LLP

Disclosing Data Collection Practices: Is An Opt-Out Program Enough?

Nossaman LLP on

Verizon Wireless announced last Friday that its customers will soon be able to opt out of the tracking identifiers Verizon uses to target ads at its customers.  These tracking identifiers, dubbed supercookies, are unique...more

Morrison & Foerster LLP - Social Media

Data for the Taking: Using the Computer Fraud and Abuse Act to Combat Web Scraping

“Web scraping” or “web harvesting”—the practice of extracting large amounts of data from publicly available websites using automated “bots” or “spiders”—accounted for 18% of site visitors and 23% of all Internet traffic in...more

19 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide