No Password Required: Founder and Commissioner of the US Cyber Games, CEO of the Cyber Marketing Firm Katzcy, and Someone Who Values Perseverance Over Perfection
Biometric Litigation
Founder of Cyber Security Unity, Member of the Order of the British Empire, and Appreciator of '80s Soap Operas
Illinois Supreme Court Clarifies BIPA Violation Accruals, Opening the Door for “Annihilative” Damage
No Password Required: The Custom T-Shirt-Wearing CEO Who Not Only Appreciates Mega Man ... He Basically Is One
Hybrid Workforces and Compliance with Sheila Limmroth
Legislating Data Privacy Series: A Conversation with Massachusetts Representatives Dave Rogers and Andy Vargas
State Law Privacy Video Series | Privacy and Sensitive Information
Podcast: BIPA Trends in 2022
State Law Privacy Video Series | Applicability
Getting Personal—Wearable Devices, Data, and Compliance
Episode 8: Why brokers, not breaches, are America's greatest privacy threat (with Rob Shavell)
NGE On Demand: Personal Data Protection Travels: The New Standard Contractual Clause with John Koenigsknecht and David Wheeler
Inside Privacy Law: The Regulation of Personal Data
NGE On Demand: Cybersecurity Considerations for Emerging Companies with Michael Gray and David Wheeler
Oklahoma: Changing Data Privacy as We Know It?
The Convergence of AI and Data Privacy in eDiscovery: Using AI and Analytics to Identify Personal Information
Reducing Cybersecurity Burdens with a Customized Data Breach Workflow
Sitting with the C-Suite: Looking Ahead to Potential Compliance Issues Due to COVID-19
Sitting with the C-Suite: Information Governance and eDiscovery - Key Compliance Issues for In-House Counsel
2022 provided companies with further clarity and insight regarding legal claims that might be viable to stop data (or web) scraping and those that likely won’t work. Data scraping continues to become an increasingly popular...more
On April 18, 2022, the Ninth Circuit reaffirmed its narrow interpretation of the Computer Fraud and Abuse Act’s (CFAA) “without authorization” prong in a data scraping dispute between hiQ and LinkedIn. The opinion upheld a...more
Data scraping is a technique by which automated tools are used to extract data from a website and format the data for analysis. Many companies mine website users’ publicly accessible data in order to tailor products and...more
Many cities in the United States utilize a self-pay portal for residents to pay bills online, known as Click2Gov. Click2Gov was compromised in 2017 and 2018, when hackers were able to access over 300,000 payment cards and...more
No one knows for sure how many "things" are connected to the Internet, but the Federal Trade Commission reported last year that it was more than 8 billion, and that it would exceed 20 billion by the end of 2020! Astonishing...more
On February 27, 2019, the Federal Trade Commission (“FTC”) announced that it settled with the operators of a video social networking app for a record civil penalty of $5.7 million under the Children’s Online Privacy...more
As we previously noted, Facebook originally announced a breach late last month, where hackers took advantage of a code vulnerability in the website’s “View As” feature, to access user’s data. ...more
Navigating the crossroads of security and convenience is a balancing act, but it can be done. Two minutes. That’s all it takes to perform a Google search on yourself—or anyone you choose—and obtain a virtual encyclopedia...more
Social networking app Wishbone, which is used primarily by teenage girls to vote on various teenage type quizzes, like favorite entertainers or fashion, has been hacked....more
An unknown intruder was able to access team communication platform HipChat last weekend, allowing access to the account information of users, including email addresses, hashed passwords and names. There is also a chance that...more
Tobias Boelter, a University of California Berkeley cryptography researcher claims that last year he found a security flaw in WhatsApp’s encrypted smart phone messaging application. The flaw, which relates to the unique...more
Boulder Partner David Zetoony published the 2017 edition of his handbook, Data Privacy and Security: A Practical Guide for In-House Counsel, on Jan. 28 – Data Privacy Day. The guide provides an overview of laws relevant to a...more
A recent nationwide poll conducted by The Rad Campaign and Lincoln Park Strategies shows that although 96 percent of American social media users distrust the ability of social media platforms to protect their personal...more
A LinkedIn data breach in 2012 supposedly exposed 6.5 million LinkedIn users’ hashed passwords. LinkedIn announced yesterday (May 18, 2016) that in fact, it impacted more than 177 million user accounts, and that the...more
We leave breadcrumbs of biometric information scattered around our daily lives, which may be collected and used by private entities, often without our knowledge or consent. The sound of your voice when you call your bank’s...more
Four pieces of legislation intended to improve online privacy and protections for Delaware residents were signed into law by Governor Jack Markell on August 7, 2015. Collectively, this legislation will impact a broad range of...more
Except for a handful of laws that apply to specific industries, such as health and financial services, there is no comprehensive federal law that requires companies to have a privacy policy. However, some states, including...more
Retail. Financial services. Health care. Energy. Not an industry has been spared when it comes to recent data and cyber breaches, and the colossal damage that occurs to the interests of the company, its employees, and third...more
The Federal Trade Commission has emphasized in the past that general privacy protections in the website space apply equally to mobile services, but a new FTC Staff Report released on Friday hones in on some privacy...more
Data use and sharing disclosures on mobile devices need work, the FTC said in a staff report released last week. The report recommends ways that actors in the mobile marketplace—such as mobile operating system providers,...more
On February 1, 2012, “smart journal” application provider, Path, Inc. (“Path”) agreed to settle Federal Trade Commission (“FTC”) charges that it deceived consumers and improperly collected personal information in violation of...more
On February 1, 2013, the Federal Trade Commission (FTC) announced a settlement with Path, Inc., a social networking mobile application developer. Path offers and distributes "smart journal" mobile apps, which permit users to...more
U.S. based tech companies that store data on the Internet may soon be required to report the loss or theft of personal information to the E.U. or face sanctions and fines according to legislation being proposed by the...more