Podcast: Interoperability: Health Care's Next Disruptor Is openEHR - Diagnosing Health Care
Strategy Considerations for Global Litigation
In-house Roundhouse: Antitrust and the Tech Industry
M365 in 5 – Part 3: OneDrive for Business – Protected personal collaboration
M365 in 5 – Part 1: Exchange Online – Not just a mailbox
Data Privacy and Security 101: Six Questions to Ask Yourself
Episode #9 - Blockchain Basics with Trokt's Chris Draper
Compliance Perspectives: The Ethics of Data
Episode #7 - It's All About Latency: The Future of Data Processing and Storage
Compliance Perspectives: Regulatory Conflicts in Data Privacy Laws
Podcast: Private Fund Regulatory Update – Network and Cloud Storage
E14: The Three Pillars of GDPR
Straight Talks: Data privacy and cybersecurity in the age of rolling smart devices
Artificial intelligence or AI—yes, we are talking about it again. The explosion of AI in healthcare will only continue to grow. Statistics show that the total market value of AI in healthcare will expand to over $148 billion...more
Governing Data Protection Legislation - 2.1. Overview of principal legislation - The General Regulation Data Protection (Regulation (EU) 2016/679) (“GDPR”), as implemented by Law 190/2018 is the principal data...more
Introduction - The General Data Protection Regulation (Regulation (EU) 2016/679) is the EU regulation which is directly applicable in all member states of the EU, including the Czech Republic, as of 25 May 2018. The new...more
Powerful ideas emerge when you look at something through a completely different lens. And when two parties come together to share those unique perspectives? That’s when the magic happens. Womble Bond Dickinson’s virtual...more
It’s official – New Hampshire has joined the procession of states across the nation (from California to Connecticut and many states in between) enacting broadly applicable consumer privacy laws....more
In July, Instagram’s parent company Meta Platforms, Inc. (“Meta”) agreed to a $68.5 million class-action biometric privacy settlement in connection with the company’s alleged violation of Illinois’ Biometric Information...more
Organizations collect and store data for all kinds of reasons, from understanding their customers and anticipating market changes to measuring their performance over time and making strategic business decisions. But as...more
During this session, the panel discussed strategies and business considerations when addressing compliance with the wide array of data protection and privacy laws and regulations across the United States and abroad. The panel...more
This presentation will discuss the recent surge in class actions challenging companies’ practices for collecting, sharing, and storing consumer data, including claims arising under the Illinois Biometric Information Privacy...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
In a four-part series, Conyers will be diving into different topics relating to Bermuda’s privacy legislation, including: why we need privacy legislation and its purpose, how do we prepare for PIPA, the role and requirements...more
The legislation of privacy protection laws in Israel has shifted into high gear and is beginning to close the gap with legislation in Europe. A major step in this direction occurred about a month ago when the Ministerial...more
Biometrics are physical or behavioral human characteristics that can be used to digitally identify a person to grant access to systems, devices, or data. Examples of biometric identifiers are fingerprints, facial geometry...more
NFTs – or non-fungible tokens – are increasingly popular among artists, sports figures, and the video game industry. But NFTs (some selling for upwards of eight figures) are not just for gamers, Mark Cuban, and the ultra...more
The healthcare industry has unique data management needs as it deals with patient information that is sensitive, personal, and confidential. However, this data is often stored and spread across different facilities and...more
On 10 June 2021, the Standing Committee of the National People’s Congress of China (NPCSC) approved the enactment of Data Security Law (the DSL) of the People’s Republic of China (PRC), which will take effect on 1 September...more
Data minimization is an operating principle that suggests an organization should only collect and utilize the minimum required data (MRD) to fulfill business operations. This principle of keeping only what we need is now...more
Back in November, I wrote on this blog about Big Data being one of the challenges that is forcing technology to move more to the data sooner in the discovery process. One of the most notable fun facts that illustrate just how...more
On November 3, 2020 California voters approved the California Privacy Rights Act (CPRA) by a healthy margin. As we discussed last year, the CPRA addresses several perceived loopholes in the California Consumer Privacy Act...more
Every organization needs to develop an effective data retention policy to gain visibility and control over its information. But given the increasing complexity of today’s data systems and the constantly evolving regulatory...more
Blockchain technology is widely anticipated to disrupt major industries and business operations over the next several years. But with all of the “hype” in the blockchain market, at times it can be difficult to separate fact...more
Technology assisted contact tracing (“TACT”), including contact tracing apps, have quickly become a component in many organizations’ and communities’ plans to combat COVID-19. Just as quickly as TACT entered the conversation,...more
Over the years, Fisher Phillips has covered the proliferation of blockchain technology extensively. From streamlining the hiring process to its ability to enforce workplace policies, the benefits are numerous. This is...more
It’s tough complying with data privacy laws. You spend gazillions of dollars complying with GDPR, and then you have to spend a bunch more in response to the California Consumer Privacy Act (CCPA). Job done, right? Not...more
The words “hodgepodge” and “patchwork” are overused in the world of risk and compliance, but they’re certainly appropriate for describing the myriad data privacy regulations popping up around the world. In 2018, the world...more