The Privacy Insider Podcast Episode 13: Preserving Privacy and Social Connection with Christine Rosen of the American Enterprise Institute
An Ounce of Prevention: Keys to Understanding and Preventing AI and Cybersecurity Risks
AD Nauseam: AI – We Had to Discuss it Eventually
Digital Planning Podcast Episode: AI Developments - Planning & Practice Considerations
Podcast - California Employment News: The Use of A.I. in the Workplace – Privacy & Confidentiality Concerns
California Employment News: The Use of A.I. in the Workplace – Privacy & Confidentiality Concerns
AD Nauseam: The FTC’s Updated Endorsement Guides: Get into the Groove
Webinar Recording – Assessing the Surge in Wiretap Litigation
Machine Learning for Environments with Bad Actors
K&L Gates Triage: Drones and Disruption in the Health Care Field
Health Tech Podcast - Episode 2: Best Practices for Health App Development
Wearables and the Future of Intellectual Property Law
BakerHostetler Partner Paul Karlsgodt Discusses Privacy Class Actions
Polsinelli Podcasts: Cloud Computing, From Cybersecurity to Confidentiality Issues
A Moment of Simple Justice - Forms
Your perspectives and perceptions towards a problem drive your approach to solving that problem. Managing data privacy challenges are no different. Therefore, to address today’s issues, it is a worthwhile exercise to review...more
As employment-related artificial intelligence (“AI”) tools proliferate, multinational employers feel increasing pressure to deploy AI across their global offices. These tools can provide great value and efficiency across the...more
If your company creates health-related apps, the Federal Trade Commission (FTC) has set out some key considerations: - Make accurate representations. Clearly explain how people’s information will be used and shared and then...more
I once again had the pleasure of presenting Cybersecurity for Tax Professionals at the IRS Nationwide Tax Forum today. The conference is designed for tax professionals in small- to medium-sized businesses....more
With 2018 in the archives, Hanzo is starting off the new year with a look ahead to the trends and challenges we believe will define the compliance and eDiscovery landscape in 2019, and a look back at the year that was at...more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more
We spend so much time on our mobile phones and on social media, yet often we don’t think of how these tools are broadcasting our lives as we work and play. With just a few steps, you can limit what you are digitally telling...more