FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
A Less is More Strategy for Data Risk Mitigation
Weathering the 2025 Whirlwind: How to Keep Calm & Carry On
Approach to Responsible AI
Why Privacy Matters to Your Business and What's in Store for 2025
No Password Required Podcast: Senior Security Researcher at Nokia and Guardian of Secure AI Networks
Getting Bang for Your Buck: Spend Your 2025 Privacy Budget Wisely
Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025
The Privacy Insider Podcast Episode 10: 2025 Privacy Predictions: Hold My Beer, 2024
AI Talk With Juliana Neelbauer - Episode Three - Cybersecurity Insurance: Coverage Challenges and Changes
No Password Required: Director and Cybersecurity Adviser at KPMG and Rain Culture Authority
Protect, Prepare, Prevail: Navigating a Complex Cybersecurity World
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Crafting an Effective Law Firm Generative AI Policy for Responsible Business Use: On Record PR
2025 Privacy Law Preview: Be Prepared
Podcast - Bowling with Bumpers: Using a Privacy Framework to Set Your Company Up for a Strike
"Monsters Inc." y el tratamiento de los datos
Unlock Privacy ROI: Why Making Cross-Functional Allies is Key
AI Discrimination and Emerging Best Practices – Part 2 - The Good Bot Podcast
The Privacy Insider Podcast Ep. 8: Privacy Over Party: Peter Swire
AI is technology that enables computers to simulate human intelligence and problem-solving skills, whereas deepfake is synthetic media that has been digitally manipulated to replace and mimic one person’s likeness. AI has...more
In 1999, computer scientist Kevin Ashton coined the term “the Internet of Things” (“IoT”) in order to put a name to his idea of using RFID chips to track items as they moved throughout a supply chain. “Though there is no...more
Welcome to the third edition of our AI Legal News Summer Roundup! After five class actions were filed between June 28 and July 11 (as reported on in our first edition of this series), on July 21, another class action lawsuit...more
China’s internet watchdog, the Cyberspace Administration of China (CAC), has continued to tighten its regulation of internet industries and driven the formulation of many new laws and regulations in cybersecurity and data...more
In this election cycle, technology and internet policy is a persistent factor across multiple issue areas. With implications for national security, economic equality, infrastructure and market regulation, the next...more
The Bavarian Data Protection Authority (“BDPA”) took the “safer internet day” in February 2019 as an opportunity to conduct privacy checks on website operators....more
On June 12, 2018, the Vietnamese National Assembly passed the Law on Cybersecurity (the “Cybersecurity Law“), which will take effect on January 1, 2019....more
Facebook announced late last week that it had suffered the largest breach in its history—50 million accounts were compromised, and another 40 million accounts affected—yes, that equals 90 million accounts. ...more
On September 20, 2018, the White House released its new National Cyber Strategy, which details a four-pillar national cybersecurity plan. In a letter to the American people preceding the 26-page plan, President Donald Trump...more
More than 15 years after the adoption of the Data Protection Directive, the European Commission noticed that the current legislative framework on data protection did not adequately deal with the risks associated with online...more
If you have ever made an online purchase, chances are that you have received at least one email in the last month notifying you that a company’s privacy policy has changed. ...more
Kara Scarboro, an attorney in Saul Ewing Arnstein & Lehr LLP’s Insurance Practice, explains the concept of “the internet of things” and how it enables real-time data to be provided from an insured to an insurance company,...more
The average internet user may be largely unaware that there are actually different “levels” of the internet. First, there is the surface level of the internet where companies post their webpages, and where employees may...more
The Federal Trade Commission on October 23, 2017, provided guidance on how it will enforce the Children’s Online Privacy Protection Act (COPPA) with respect to audio recordings of children. This comes as part of a wave of...more
Energy and Critical Infrastructure Industries Warned of Increased Attacks by FBI and DHS - The FBI and Department of Homeland Security issued a joint statement on October 20, 2017 warning of an increased danger of a...more
When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more
The Digital Economy Bill passed into UK law last Thursday 27 April 2017 amidst the flurry of activity known as the “wash up” period before the dissolution of Parliament and ahead of the early general election in the UK to be...more
In a key decision, the European Court of Justice has ruled that dynamic IP addresses may qualify as personal data in certain circumstances—ending years of uncertainty about whether such fundamental building blocks of the...more
California’s Attorney General, Kamala Harris, has required Houzz, a home décor information and e-commerce website and mobile app publisher, to hire a chief privacy officer (CPO), conduct a company-wide privacy assessment, and...more
What is the Internet of Things? The 'Internet of Things' (IoT) is a catchphrase describing the increasing interconnectedness between smart devices and sensors facilitated through their connection to the internet. It's not a...more
Internet commenters and legal analysts alike are buzzing about the Ashley Madison hack. The website -- which billed itself as a networking site for anyone who wanted to discretely arrange an extramarital affair -- has already...more
In 2013 alone, the U.S. Department of Homeland Security (DHS) and its Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to more than 256 cyber-incident reports—more than half of them in the energy...more
In the wake of reported security breaches at a number of significant financial institutions, cybersecurity is garnering more attention and concern than ever before — both within the financial services industry and among...more
The Internet of Things (IoT) is coming and perhaps the first place we will see the proverbial rubber hit the road is with something near and dear to Americans – our cars. The ever increasing connectivity of cars is creating a...more
If "The Year of the Breach" and the rapid start to data breaches in 2015 have taught us anything, it is that any company is susceptible to a cyber attack; and, while data breaches are not a new concept, the way the private...more