The Privacy Insider Podcast Episode 13: Preserving Privacy and Social Connection with Christine Rosen of the American Enterprise Institute
An Ounce of Prevention: Keys to Understanding and Preventing AI and Cybersecurity Risks
AD Nauseam: AI – We Had to Discuss it Eventually
Digital Planning Podcast Episode: AI Developments - Planning & Practice Considerations
Podcast - California Employment News: The Use of A.I. in the Workplace – Privacy & Confidentiality Concerns
California Employment News: The Use of A.I. in the Workplace – Privacy & Confidentiality Concerns
AD Nauseam: The FTC’s Updated Endorsement Guides: Get into the Groove
Webinar Recording – Assessing the Surge in Wiretap Litigation
Machine Learning for Environments with Bad Actors
K&L Gates Triage: Drones and Disruption in the Health Care Field
Health Tech Podcast - Episode 2: Best Practices for Health App Development
Wearables and the Future of Intellectual Property Law
BakerHostetler Partner Paul Karlsgodt Discusses Privacy Class Actions
Polsinelli Podcasts: Cloud Computing, From Cybersecurity to Confidentiality Issues
A Moment of Simple Justice - Forms
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of April 20-26. Here’s what’s...more
In Lively v. Wayfarer Studios LLC, 2025 WL 662896 (S.D.N.Y. Feb. 28, 2025), the court granted in part and denied in part a motion to quash subpoenas issued to AT&T, Verizon, and T-Mobile (the “Wayfarer Parties”) by Ms. Blake...more
Maybe some of you will look at the title of this article, smirk, and dismissively mutter that there is nothing new about text messages. eDiscovery practitioners also may think there is nothing revolutionary about considering...more
GDPR. It’s all over the news. G** D@m% PR. Nearly everyone’s flustered by it. And, if you’re not already sick of hearing about it, your company’s probably still scrambling to duct-tape together a last minute patch to comply...more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more