The Privacy Insider Podcast Episode 13: Preserving Privacy and Social Connection with Christine Rosen of the American Enterprise Institute
An Ounce of Prevention: Keys to Understanding and Preventing AI and Cybersecurity Risks
AD Nauseam: AI – We Had to Discuss it Eventually
Digital Planning Podcast Episode: AI Developments - Planning & Practice Considerations
Podcast - California Employment News: The Use of A.I. in the Workplace – Privacy & Confidentiality Concerns
California Employment News: The Use of A.I. in the Workplace – Privacy & Confidentiality Concerns
AD Nauseam: The FTC’s Updated Endorsement Guides: Get into the Groove
Webinar Recording – Assessing the Surge in Wiretap Litigation
Machine Learning for Environments with Bad Actors
K&L Gates Triage: Drones and Disruption in the Health Care Field
Health Tech Podcast - Episode 2: Best Practices for Health App Development
Wearables and the Future of Intellectual Property Law
BakerHostetler Partner Paul Karlsgodt Discusses Privacy Class Actions
Polsinelli Podcasts: Cloud Computing, From Cybersecurity to Confidentiality Issues
A Moment of Simple Justice - Forms
Last week’s NFL draft highlighted more than the accomplishments of athletes at the combine or on the field. While there was extensive coverage of the merits of each player, one of the major headlines coming out of the draft...more
Data Privacy, Abortion Limits Set to Collide Post-Roe "Even before the June 24 ruling in Dobbs v. Jackson Women’s Health Organization, privacy advocates, concerned that data on women seeking abortions could be used to target...more
By now, most everyone knows that ransomware is software that infects your computer system, makes your data irretrievable and usually breaks things along the way. To unlock your system, the bad guys (or girls) demand you pay a...more
Although it seems that every day less people care about their privacy, the ability to maintain parts of your life as private remains crucial to our democracy, our economy, and our personal wellbeing. Many people expose their...more
Violations of privacy–already regulated by the Office of the Privacy Commissioner of Canada (as well as provincial privacy regulators)–may also soon be regulated by Canada’s Competition Bureau. In a statement yesterday at the...more
UNITED STATES - Regulatory—Policy, Best Practices, and Standards - NIST Evaluates Advances in Face Recognition Software - On November 30, 2018, the National Institute of Standards and Technology ("NIST") published a...more
Parents who took their children to Disney World in recent years may have been surprised when Disney “cast members” asked the young princes and princesses to place a finger on a scanner before entering the parks. Biometric...more
All too often our Inbox is filled with spam, nonbusiness, or merely unsolicited emails. Whether or not welcome, some are legitimate marketing communications looking to make a sale. Often, however, they are spam emails seeking...more
Regulating the Internet of Things (“IoT”) is a highly debated topic because it is hard for lawmakers to keep up with evolving technology. Simply put, IoT refers to a system of connected devices that can retain, analyze, and...more
There has been a lot of attention in the media lately with respect to the Facebook/Cambridge Analytica issue and its fall-out (including today’s coverage of the announcement that Facebook suspended almost 200 apps pending a...more
Health Care Organizations Saw an 89% Increase in Ransomware in 2017 - Our experience last year is consistent with the conclusion of a new report issued by Cryptonite in its 2017 Health Care Cyber Research Report—that the...more
In this month's edition of our Privacy & Cybersecurity Update, we discuss the Article 29 Data Protection Working Party's critique of the Privacy Shield and the Sixth Circuit's decision to consider the issue of computer fraud...more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more
Legal marijuana is America’s fastest-growing industry. According to ArcView Market Research, cannabis revenue is expected to exceed $22 billion by 2020—nearly double that of the NFL. This past year, Colorado saw its sales...more
In the wake of Edward Snowden’s disclosures, the United States administration faced a daunting series of challenges on surveillance, cybersecurity, and privacy. Congress was reluctant to enact comprehensive legislation....more
Few issues keep executives awake at night more than Privacy and Data Security. New regulations and threats alike are plentiful, varied, and evolving. The rate of change for cybersecurity and information governance continues...more
There is no such thing as compliance with the NIST Cybersecurity Framework (FTC). In September, the FTC dispelled a commonly held misconception regarding the NIST Framework: It “is not, and isn’t intended to be, a standard or...more
Cybersecurity and privacy of customer information have become such a critical issues that in-house counsel should treat them as board of directors-level issues. In-house counsel should do that with presentations for their...more
I am watching Game 7 of the World Series, and it is the bottom of the 8th and the score is 6-6. It is very difficult to concentrate on this blog post. So I am taking the easy way out and reminding you to check the...more
A report issued last week by Beazley, one of the prominent insurance companies in the cyber field, revealed what industry experts predicted earlier in the year – ransomware is an increasingly prevalent menace. That report is...more
TalkTalk, a major UK telecoms company, has been fined £400,000 for a data breach after they were hacked. This is a record fine given by the ICO (the UK’s data protection authority). Significantly the fine was imposed after a...more
As family office executives set up a family office or review an existing family office, it is important to make sure the privacy and cybersecurity concerns are addressed and the governance and information security...more
New privacy torts have recently emerged in certain Canadian jurisdictions, including intrusion upon seclusion and publicity given to private life. Intrusion upon seclusion allows a plaintiff to sue if (1) a person has...more
It is not a matter of "if" but "when" an employer will be required to notify employees of a security breach. Forty-seven states require employers to notify employees when defined categories of personal information, including...more
The National Association of Insurance Commissioners (“NAIC”) continued its efforts to advance cybersecurity in the insurance industry when it recently adopted the Cybersecurity Bill of Rights. The Cybersecurity Bill of Rights...more