News & Analysis as of

Data Privacy Email

A&O Shearman

Business email compromise and invoice fraud – a duty of care on the innocent?

A&O Shearman on

The Western Australian District Court’s recent decision in Mobius Group Pty Ltd v Inoteq Pty Ltd1 highlights the potential consequence for the innocent party where fraudulent changes in bank details are sent from their...more

Holland & Knight LLP

Texas Case Offers Lessons Learned from Data Requests and Criminal Causes of Action

Holland & Knight LLP on

In Angelyn A. Olson et al. v. The Consilio LLC, et al. filed in Tarrant County, Texas, plaintiff Angelyn Olson alleged that she was involved in other litigation during which an e-discovery service provider (Consilio) was...more

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

Bradley Arant Boult Cummings LLP

Merely Copying In-House Counsel Does Not Necessarily Establish Attorney-Client Privilege

Businesses who employ in-house attorneys frequently assume that copying their lawyer on internal communications shields the communications from discovery because of the attorney-client privilege. In 1981, the U.S. Supreme...more

Bricker Graydon LLP

Scammers, SSNs, and Smelling Funny

Bricker Graydon LLP on

I was hanging out with my friend this weekend, both catching up on emails from a coffee shop. After a while, he turned to me. “Well sh*t. Looks like my social security number might be on the dark web.”...more

BakerHostetler

Data Security, Commercial Email and Employee Reviews Walk into a Bar...

BakerHostetler on

Sorry folks, there is no punchline here, but there are bottom lines from a settlement the Federal Trade Commission (FTC) announced last week. We discuss three today: (1) the FTC continues to mount broad investigations and...more

McDermott Will & Emery

Private Nutzung von Internet und E-Mail am Arbeitsplatz: Endlich mehr Sicherheit für Arbeitgeber?

McDermott Will & Emery on

Private Nutzung von Internet und E-Mail am Arbeitsplatz: Endlich mehr Sicherheit für Arbeitgeber? Nach bisheriger Auffassung der deutschen Datenschutzbehörden ist der Arbeitgeber bei gestatteter Privatnutzung von...more

EDRM - Electronic Discovery Reference Model

Optimizing the Remote Reach: Strategies for Secure and Efficient Data Collection

The digital revolution has irrevocably transformed the way we conduct business, and investigations are no exception. The surge in remote work models has rendered traditional on-site data collection methods increasingly...more

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

Klein Moynihan Turco LLP

FTC Health Data Privacy Crackdown Continues

On April 11, 2024, Monument, Inc. (“Monument”), settled claims brought by the Federal Trade Commission (“FTC”) alleging that it had committed certain health data privacy law violations. Monument provides online addiction...more

K&L Gates LLP

Employment Practices and Data Protection: Monitoring Workers 101

K&L Gates LLP on

The Information Commissioner’s Office (ICO) has recently published guidance for employers on monitoring workers lawfully, transparently and fairly. The guidance aims to protect workers’ data protection rights and help...more

Good2bSocial

AI in Legal Marketing: How to Leverage this Powerful New Technology for Your Next Campaign

Good2bSocial on

If you pay much attention to the digital space, then you know AI is here to stay. More than a passing fad, AI tools are proving to be market disruptors that we should all plan to use in the coming years...more

TransPerfect Legal

Chatting without Penalty: The Evolving Role of Instant Messaging in Legal Matters

TransPerfect Legal on

I. The Phenomenon of Instant Messaging- Evolution and Proliferation- From basic platforms like IRC and AIM to globally dominant apps such as WhatsApp and Telegram, instant messaging (IM) has witnessed a radical...more

Ankura

The Executive's Guide to Harnessing GPT's Unparalleled Intelligence

Ankura on

The digital age has generated an unprecedented data influx threatening even the most formidable enterprises. The challenges are no longer just about competition or market share; it is a battle against time, complexity, and...more

Davies Ward Phillips & Vineberg LLP

Ownership of Privileged Communications in M&A Transactions: Practical Takeaways and Recent Case Law

Traduction en cours. Can the buyer in a M&A transaction who takes possession of the seller’s or target company’s privileged communications on closing use those communications in a post-closing dispute against the seller?...more

StoneTurn

eDiscovery and Forensic Investigations: Six Tips for Managing Company Messaging Protocols

StoneTurn on

The world of workforce communication looks vastly different from 2020, including an increased blur between personal and business communications due to remote work environments and access to instant messaging and...more

Davis Wright Tremaine LLP

Connecticut Expands Regulation of Consumer Data Privacy

The Connecticut legislature passed and the governor recently signed amendments to the Connecticut Data Privacy Act (CTDPA), the state's comprehensive consumer data privacy law, which goes into effect July 1, 2023. Some...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 3, March 2023

Amazon Sued for Not Telling New York Store Customers about Tracking Biometrics - “Thanks to a 2021 law, New York is the only major American city to require businesses to post signs letting customers know they’re tracking...more

Legal Internet Solutions Inc.

One More Thing from 2022 with Team LISI

Hey, podcast listeners. I am Taryn Elliott, director of client success and marketing at LISI, and this is LISI’s All the Things podcast. Team LISI is in the hot seat for this month’s episode of One More Thing. Robyn Addis,...more

Woodruff Sawyer

Scams and Viruses: Which Email Attachments Are Safe to Open?

Woodruff Sawyer on

Email scams and viruses are nothing new—threats like phishing emails and malware have been around since the days when services like AOL still dominated the internet and email landscape. However, while technology has made a...more

J.S. Held

How to Avoid the Most Common Causes of Cybersecurity Incidents

J.S. Held on

Cybercrime is at an all-time high, with just the cybercrime insurance industry alone expecting to grow from $8 billion globally in 2020 to $20 billion by 2025.1 Although cyber liability insurance policies now exist to help...more

Bass, Berry & Sims PLC

Privacy Peril: Back It Up

Bass, Berry & Sims PLC on

A recent Privacy Peril advised of the increasing cyber risk from nation state attacks, particularly as a result of the war in Ukraine. There is, of course, little we can do to thwart cyber assaults on vital nerve centers....more

Robinson+Cole Data Privacy + Security Insider

New Jersey Settles with Cancer Center Over Business Email Compromise

One of the challenging things about HIPAA (Health Insurance Portability and Accountability Act) enforcement is the fact that both the Office for Civil Rights and State AGs have jurisdiction to assess fines and penalties for...more

Robinson+Cole Data Privacy + Security Insider

Phoenix Children’s Hospital Faces Privacy Lawsuit Over Inadvertent Release of Vaccine Exemption Information

An apparent email snafu has led to the filing of a putative class action against the Phoenix Children’s Hospital. The allegations stem from an email that was allegedly sent out to 368 people that outlined the protocols for...more

Bass, Berry & Sims PLC

Privacy Peril: New Invoice – Action Required!

Bass, Berry & Sims PLC on

According to Microsoft, 91% of cyberattacks start with an email. In an earlier Privacy Peril we provided information on prevalent words phishers of men and women insert in an email subject line to grab the recipient’s...more

91 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide