Podcast: Interoperability: Health Care's Next Disruptor Is openEHR - Diagnosing Health Care
Strategy Considerations for Global Litigation
In-house Roundhouse: Antitrust and the Tech Industry
M365 in 5 – Part 3: OneDrive for Business – Protected personal collaboration
M365 in 5 – Part 1: Exchange Online – Not just a mailbox
Data Privacy and Security 101: Six Questions to Ask Yourself
Episode #9 - Blockchain Basics with Trokt's Chris Draper
Compliance Perspectives: The Ethics of Data
Episode #7 - It's All About Latency: The Future of Data Processing and Storage
Compliance Perspectives: Regulatory Conflicts in Data Privacy Laws
Podcast: Private Fund Regulatory Update – Network and Cloud Storage
E14: The Three Pillars of GDPR
Straight Talks: Data privacy and cybersecurity in the age of rolling smart devices
In Angelyn A. Olson et al. v. The Consilio LLC, et al. filed in Tarrant County, Texas, plaintiff Angelyn Olson alleged that she was involved in other litigation during which an e-discovery service provider (Consilio) was...more
The Department of Health and Human Services (HHS) Office for Human Research Protections (OHRP) recently held its 2024 Exploratory Workshop titled “The Evolving Landscape of Human Research with AI – Putting Ethics to Practice”...more
Federal officials recently banned a software provider from selling, disclosing, or licensing any web browsing data for advertising purposes – and ordered to pay $16.5 million. The Federal Trade Commission (FTC) alleged that...more
Powerful ideas emerge when you look at something through a completely different lens. And when two parties come together to share those unique perspectives? That’s when the magic happens. Womble Bond Dickinson’s virtual...more
Avast Limited, a United Kingdom-based company that marketed its browser extensions and antivirus software to protect consumer privacy did just the opposite—storing consumer browsing data indefinitely and selling it...more
Startups face unique challenges that can impact their success and sustainability. Obstacles such as financial constraints (inadequate funding or limited cash flow) and resource constraints often result in small teams having...more
Google has agreed to pay a whopping $155M to resolve a government investigation and a class action lawsuit stemming from its use of location data, including claims that it stored and collected consumers’ location-related...more
In July, Instagram’s parent company Meta Platforms, Inc. (“Meta”) agreed to a $68.5 million class-action biometric privacy settlement in connection with the company’s alleged violation of Illinois’ Biometric Information...more
The Illinois Supreme Court unanimously ruled that the exclusivity provisions of the Workers’ Compensation Act do not bar a claim for statutory damages under the Biometric Information Privacy Act (BIPA). In so doing, the Court...more
Organizations collect and store data for all kinds of reasons, from understanding their customers and anticipating market changes to measuring their performance over time and making strategic business decisions. But as...more
During this session, the panel discussed strategies and business considerations when addressing compliance with the wide array of data protection and privacy laws and regulations across the United States and abroad. The panel...more
Information governance (IG) plays an increasingly significant role of the way corporations do business. But what do organizations do with all their data? Where do they store it—and is it secure, well organized, and...more
This presentation will discuss the recent surge in class actions challenging companies’ practices for collecting, sharing, and storing consumer data, including claims arising under the Illinois Biometric Information Privacy...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
An Illinois appellate court has ruled that Apple’s biometric unlock features, including Touch ID fingerprint scanning and Face ID facial geometry scanning, do not violate the state’s Biometric Information Privacy Act (BIPA)....more
Today’s Privacy Reality: AI, Assessments, Breach and DSARs is a webcast that will bring together a panel of experts to discuss the impact of artificial intelligence (AI) on privacy and cybersecurity. The panel will address...more
IN MARCH, two veteran Facebook engineers found themselves grilled about the company’s sprawling data collection operations in a hearing for the ongoing lawsuit over the mishandling of private user information stemming from...more
The UK Department for Digital, Culture, Media & Sport (DCMS) recently extended the deadline for responses to a policy paper issued on May 26, 2022, calling for views on UK data storage and processing infrastructure, security,...more
In a four-part series, Conyers will be diving into different topics relating to Bermuda’s privacy legislation, including: why we need privacy legislation and its purpose, how do we prepare for PIPA, the role and requirements...more
Prognostications and predictions are inherently flawed. Does anyone really believe Punxsutawney Phil is a reliable weather forecaster? And how many of us, in our predictions of what would happen in legal technology in 2020,...more
When entering into any merger or acquisition (both a stock deal and an asset deal), there are numerous privacy and data security issues that must be evaluated and addressed from the beginning. Most companies in today’s online...more
The legislation of privacy protection laws in Israel has shifted into high gear and is beginning to close the gap with legislation in Europe. A major step in this direction occurred about a month ago when the Ministerial...more
Biometrics are physical or behavioral human characteristics that can be used to digitally identify a person to grant access to systems, devices, or data. Examples of biometric identifiers are fingerprints, facial geometry...more
Does your company use fingerprinting or some facial recognition scanner as part of its clock-in, clock-out process? If your company has facilities or even some contacts with Illinois (and maybe other states in the future) you...more
On 10 June 2021, the Standing Committee of the National People’s Congress of China (NPCSC) approved the enactment of Data Security Law (the DSL) of the People’s Republic of China (PRC), which will take effect on 1 September...more