Podcast: Interoperability: Health Care's Next Disruptor Is openEHR - Diagnosing Health Care
Strategy Considerations for Global Litigation
In-house Roundhouse: Antitrust and the Tech Industry
M365 in 5 – Part 3: OneDrive for Business – Protected personal collaboration
M365 in 5 – Part 1: Exchange Online – Not just a mailbox
Data Privacy and Security 101: Six Questions to Ask Yourself
Episode #9 - Blockchain Basics with Trokt's Chris Draper
Compliance Perspectives: The Ethics of Data
Episode #7 - It's All About Latency: The Future of Data Processing and Storage
Compliance Perspectives: Regulatory Conflicts in Data Privacy Laws
Podcast: Private Fund Regulatory Update – Network and Cloud Storage
E14: The Three Pillars of GDPR
Straight Talks: Data privacy and cybersecurity in the age of rolling smart devices
Startups face unique challenges that can impact their success and sustainability. Obstacles such as financial constraints (inadequate funding or limited cash flow) and resource constraints often result in small teams having...more
The COVID-19 pandemic accelerated our shift to remote work, which was already on the rise with the advent of new technology. Even before 2020, employees worked from nontraditional spaces, including coworking spaces and home...more
WorldCoin is a cryptocurrency project which uses iris scanning technology to issue a “World ID” as a digital identifier. Privacy concerns over WorldCoin have been voiced by several data protection authorities worldwide....more
This presentation will discuss the recent surge in class actions challenging companies’ practices for collecting, sharing, and storing consumer data, including claims arising under the Illinois Biometric Information Privacy...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
Data is like the mail: it just keeps coming in, day after day. Storing and maintaining it is a never-ending process. Excess data can slow down operations, diminishing a law firm’s productivity, profitability, and public...more
The average cost of a data breach is on the rise. According to the 2022 ForgeRock Consumer Identity Breach Report, the average cost in 2021 of recovering from a data breach in the U.S. is $9.5 million — an increase of 16%...more
Today’s Privacy Reality: AI, Assessments, Breach and DSARs is a webcast that will bring together a panel of experts to discuss the impact of artificial intelligence (AI) on privacy and cybersecurity. The panel will address...more
This year, sentiment has declined to a tepid level with respect to cryptocurrency markets. For example, while some experts still believe that bitcoin could crack the $100,000 mark, the price of bitcoin slumped to under...more
Digital collaboration is moving fast, and no one knows this better than Microsoft Teams. Launched in 2017 and currently sitting at 270 million users, Teams has quickly become the hub for workplace collaboration in thousands...more
1. Introduction- China’s cross-border data transfer rules are unfolding in real time and taking clearer shape. On July 7, 2022, China’s cybersecurity regulatory agency, the Cyberspace Administration of China (“CAC”), issued...more
On June 17, 2022, TikTok Inc. (“TikTok”) reportedly completed the migration of its U.S. users’ information to servers at Oracle Corporation (“Oracle”) in a move that bars access by Chinese parent company ByteDance. ...more
The automotive industry has been a tight-knit and exclusive club since the 1950s automobile boom. After months of distress caused by semiconductor chip shortages, assembly plant shutdowns, and higher prices, is that still the...more
The German Data Protection Conference (DSK) issued guidance on the Federal Act on the Regulation of Data Protection and Privacy in Telecommunications and Telemedia (‘TTDSG’), which went into effect on December 1, 2021...more
The world is awash in data, and the amount of data continues to grow at an astounding rate. According to some estimates, global data storage will amount to more than 200 zettabytes by 2025. When you consider that one...more
Only two months after the release of the second draft of the Data Security Law of the People’s Republic of China (the Second Draft), on June 10, 2021, the Standing Committee of the National People's Congress passed the new...more
The beginner’s guide to Microsoft Teams eDiscovery - Welcome to our Beginner’s Guide to Microsoft Teams eDiscovery — where we’ll cover everything you need to know about eDiscovery for Microsoft Teams, the communication and...more
The healthcare industry has unique data management needs as it deals with patient information that is sensitive, personal, and confidential. However, this data is often stored and spread across different facilities and...more
BIPA, the frequently used basis for class action lawsuits in connection with facial recognition, fingerprint, and other technologies is once again serving as the basis for two recently filed suits. What to Know - Class...more
U.S. Developments - Tesla buys $1.5 billion in Bitcoin - In a 10-K filing with the Securities and Exchange Commission (SEC) on Monday, Tesla announced that it had bought $1.5 billion worth of bitcoin. Tesla said the...more
Building upon the California Consumer Privacy Act (CCPA), on November 3, 2020, Californians voted to approve Proposition 24: the California Privacy Rights Act (CPRA). The CPRA does not replace the CCPA but rather adds to and...more
From investigating cybersecurity breaches to conducting discovery in civil litigation, the practice of digital forensics plays an essential role in many aspects of companies’ compliance, data protection, and risk management...more
Blockchain technology is widely anticipated to disrupt major industries and business operations over the next several years. But with all of the “hype” in the blockchain market, at times it can be difficult to separate fact...more
The Supreme Court recently granted certiorari in Facebook, Inc. v. Duguid to resolve a deepening circuit split on the question of what qualifies as an automatic telephone dialing system (ATDS or autodialer) under the...more
Twenty days after the Supreme Court granted petition for writ of certiorari in Facebook v. Duguid to review the question of what constitutes an ATDS under the TCPA, the Sixth Circuit issued its own opinion addressing this...more