The Privacy Insider Podcast Episode 13: Preserving Privacy and Social Connection with Christine Rosen of the American Enterprise Institute
An Ounce of Prevention: Keys to Understanding and Preventing AI and Cybersecurity Risks
AD Nauseam: AI – We Had to Discuss it Eventually
Digital Planning Podcast Episode: AI Developments - Planning & Practice Considerations
Podcast - California Employment News: The Use of A.I. in the Workplace – Privacy & Confidentiality Concerns
California Employment News: The Use of A.I. in the Workplace – Privacy & Confidentiality Concerns
AD Nauseam: The FTC’s Updated Endorsement Guides: Get into the Groove
Webinar Recording – Assessing the Surge in Wiretap Litigation
Machine Learning for Environments with Bad Actors
K&L Gates Triage: Drones and Disruption in the Health Care Field
Health Tech Podcast - Episode 2: Best Practices for Health App Development
Wearables and the Future of Intellectual Property Law
BakerHostetler Partner Paul Karlsgodt Discusses Privacy Class Actions
Polsinelli Podcasts: Cloud Computing, From Cybersecurity to Confidentiality Issues
A Moment of Simple Justice - Forms
Collecting data from mobile devices presents unique challenges that legal teams can’t afford to overlook. From rapidly evolving technology to privacy concerns, navigating mobile collections requires a thoughtful, defensible...more
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of April 20-26. Here’s what’s...more
If you’re afraid of artificial intelligence, you’re not alone, and you’re not wrong to be cautious. AI is no longer science fiction. It’s embedded in the apps we use, the decisions that affect our lives, and the tools...more
In Lively v. Wayfarer Studios LLC, 2025 WL 662896 (S.D.N.Y. Feb. 28, 2025), the court granted in part and denied in part a motion to quash subpoenas issued to AT&T, Verizon, and T-Mobile (the “Wayfarer Parties”) by Ms. Blake...more
Summary and analysis of Professor Allyson Stuart’s much needed law review article on privacy in ediscovery in civil litigation. The article is supplemented with an interview of Professor Stuart on ediscovery and privacy...more
Editor’s Note: On March 17, 2021, HaystackID shared an educational webcast designed to inform and update legal and data discovery professionals on how organizations are preparing and responding to increasing security and...more
With most employees working remotely amidst the COVID-19 pandemic, the use of videoconferencing platforms like Zoom, Microsoft Teams, Skype, WebEx, GoTo, Ring, and BlueJeans in everyday business has risen dramatically. ...more
There is no denying that communication (or the lack thereof) can be an obstacle when it comes to reaching objectives. For a global organization this can mean the literal languages between stakeholders in different countries,...more
UK law enforcement can now obtain an order against a person in or operating in the US for the production of or access to electronic data under a new ‘landmark’ US-UK data sharing agreement. The agreement has been heralded...more
CEP Magazine, December 2019 - The US forged two agreements in the span of a week regarding the sharing of electronic data for law enforcement purposes with the governments of Australia and the UK. The agreements help each...more
Maybe some of you will look at the title of this article, smirk, and dismissively mutter that there is nothing new about text messages. eDiscovery practitioners also may think there is nothing revolutionary about considering...more
Deciding whether mobile devices should be imaged can be difficult when it comes to eDiscovery. They contain a large variety of file-types and data intermingled with a lot of private information, which may be privileged....more
For most of us, the concept of facial recognition – like so much technology of the last decade – began as a sci-fi detail we accepted on the big screen but didn’t give much thought to in our day-to-day lives. Then one day,...more
With 2018 in the archives, Hanzo is starting off the new year with a look ahead to the trends and challenges we believe will define the compliance and eDiscovery landscape in 2019, and a look back at the year that was at...more
According to the Associated Press, Ford Motor Company and Walmart, Inc. have joined forces along with Postmates to test self-driving vehicles for a grocery delivery service. The tests are expected to take place in...more
Just when the European Union's General Data Protection Regulation, or GDPR, was about to go into effect, the United States Congress created the CLOUD Act (Clarifying Overseas Use of Data). Without any public hearings,...more
GDPR. It’s all over the news. G** D@m% PR. Nearly everyone’s flustered by it. And, if you’re not already sick of hearing about it, your company’s probably still scrambling to duct-tape together a last minute patch to comply...more
It would be unusual these days to find a hotel, coffee shop, cruise line or airline that doesn’t offer some form of internet access to its customers. It’s unlikely, however, that those businesses have had occasion to give...more
We’ve written several times about the landmark dispute between the U.S. government and Microsoft Corp. over access to a customer’s emails stored in Ireland. Now, a month after the U.S. Supreme Court heard oral argument on the...more
In October 2017, the Supreme Court granted the Department of Justice’s petition to review the Second Circuit’s decision that limits the reach of warrants issued under the Stored Communications Act (“SCA”). Specifically, the...more
The fight over the privacy of electronic communications and the government’s ability to reach emails stored abroad in criminal investigations has finally moved to the U.S. Supreme Court. ...more
If the government obtains information about your past locations from your wireless provider, is that a search? If so, is it a search that requires the government to obtain a warrant? Courts have held that, because companies...more
A federal judge in California has agreed to hold Google in contempt for not following his order to turn over data stored overseas. The order is largely symbolic, however, since a contempt order is required for Google to...more
The eighth edition of The E-Discovery Digest focuses on recent decisions addressing the scope and application of the attorney-client privilege and work-product doctrine, spoliation, and discovery responses....more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more