The Privacy Insider Podcast Episode 13: Preserving Privacy and Social Connection with Christine Rosen of the American Enterprise Institute
An Ounce of Prevention: Keys to Understanding and Preventing AI and Cybersecurity Risks
AD Nauseam: AI – We Had to Discuss it Eventually
Digital Planning Podcast Episode: AI Developments - Planning & Practice Considerations
Podcast - California Employment News: The Use of A.I. in the Workplace – Privacy & Confidentiality Concerns
California Employment News: The Use of A.I. in the Workplace – Privacy & Confidentiality Concerns
AD Nauseam: The FTC’s Updated Endorsement Guides: Get into the Groove
Webinar Recording – Assessing the Surge in Wiretap Litigation
Machine Learning for Environments with Bad Actors
K&L Gates Triage: Drones and Disruption in the Health Care Field
Health Tech Podcast - Episode 2: Best Practices for Health App Development
Wearables and the Future of Intellectual Property Law
BakerHostetler Partner Paul Karlsgodt Discusses Privacy Class Actions
Polsinelli Podcasts: Cloud Computing, From Cybersecurity to Confidentiality Issues
A Moment of Simple Justice - Forms
Last week’s NFL draft highlighted more than the accomplishments of athletes at the combine or on the field. While there was extensive coverage of the merits of each player, one of the major headlines coming out of the draft...more
In the quiet corridors of Apple’s headquarters, executives face a decision that could reshape the future of digital privacy for billions of users worldwide. The catalyst? A controversial order from the United Kingdom’s...more
Your perspectives and perceptions towards a problem drive your approach to solving that problem. Managing data privacy challenges are no different. Therefore, to address today’s issues, it is a worthwhile exercise to review...more
TikTok users are seeking alternate platforms to share and view content as the U.S. is set to ban the popular social media app on January 19, 2025. Instead of turning to U.S.-based companies like Facebook or Instagram, users...more
In response to a constantly-evolving cyber threat landscape, the Biden Administration recently announced the launch of a new cybersecurity labeling program – the U.S. Cyber Trust Mark program – in an effort to enhance...more
EU and U.S. Agree to New Data-Sharing Pact, Offering Some Respite for Big Tech “For over a year, officials on either side of the Atlantic have been hashing out a deal to replace the so-called Privacy Shield.” Why this...more
We always suspected that the Amazon Echo resting quietly in your family room was more insidious than it seemed. Now we have confirmation. We know that the Echo can hear us. We also know that it records private conversations...more
There is a reason we don’t all have a definitive digital identifier. I am describing a digital ID to be used by everybody for everything we do online – any bank would know you anywhere and know what funds it could give...more
Later this week, January 28, 2021 will mark International Privacy Day: a day corporations release educational efforts around privacy and data protection. There are many reasons to approach privacy proactively in 2021: (1)...more
I continue to be quite surprised at the lack of understanding that people have about personal assistants such as Alexa and Echo. It seems logical to me that when you yell out “Alexa, turn on the lights!”...more
A few weeks ago on this blog, we addressed some of the legal issues that have arisen for Zoom, as it becomes a significant part of American daily life during the COVID-19 pandemic. Among those legal issues was an inquiry...more
On October 7, the Federal Trade Commission (FTC or the “Commission”) brought together privacy and technology stakeholders for a public workshop aimed at informing updates to regulations promulgated under the Children’s Online...more
The use of artificial intelligence (AI) in the fashion and beauty industries — and the marketing of the same — has steadily gained traction over the last few years and it’s not hard to see why. AI provides a myriad of...more
UNITED STATES - Regulatory—Policy, Best Practices, and Standards - NIST Evaluates Advances in Face Recognition Software - On November 30, 2018, the National Institute of Standards and Technology ("NIST") published a...more
"Open the pod door, HAL" • Commercial voice-activated intelligent personal assistants from Amazon, Apple, Google, and Microsoft, among others, are growing in popularity. • A report from NPR and Edison Research states...more
Parents who took their children to Disney World in recent years may have been surprised when Disney “cast members” asked the young princes and princesses to place a finger on a scanner before entering the parks. Biometric...more
It is common for individuals to see the “padlock icon” on their browser bar when visiting a website, and assume they are safe. Sadly, this assumption is no longer valid. As we approach Data Privacy Day (January 28, 2019) many...more
Regulating the Internet of Things (“IoT”) is a highly debated topic because it is hard for lawmakers to keep up with evolving technology. Simply put, IoT refers to a system of connected devices that can retain, analyze, and...more
According to myth, vampires can only enter your home if you let them in. Hackers, the vampires of cyber-world, are out there, waiting for you to ‘invite’ them in so they may feed on your private information. There is no...more
Given the volume of reporting on the data security risks posed by hackers and other bad actors online, it can be easy to overlook the "visual privacy" risks we encounter every day in the real world. As any "perpetually...more
There has been a lot of attention in the media lately with respect to the Facebook/Cambridge Analytica issue and its fall-out (including today’s coverage of the announcement that Facebook suspended almost 200 apps pending a...more
As family office executives set up a family office or review an existing family office, it is important to make sure the privacy and cybersecurity concerns are addressed and the governance and information security...more
The World Energy Council recently warned the utility industry that one of the top threats to the energy sector is advanced malware attacks. The warning noted that the utility sector is vulnerable because of the size of the...more
With the revelations that the Paris and San Bernardino attackers used encrypted communications to recruit, communicate and plan their attacks, the U.S. government is again pushing the tech industry to provide it backdoor...more
It is not a matter of "if" but "when" an employer will be required to notify employees of a security breach. Forty-seven states require employers to notify employees when defined categories of personal information, including...more