The Privacy Insider Podcast Episode 13: Preserving Privacy and Social Connection with Christine Rosen of the American Enterprise Institute
An Ounce of Prevention: Keys to Understanding and Preventing AI and Cybersecurity Risks
AD Nauseam: AI – We Had to Discuss it Eventually
Digital Planning Podcast Episode: AI Developments - Planning & Practice Considerations
Podcast - California Employment News: The Use of A.I. in the Workplace – Privacy & Confidentiality Concerns
California Employment News: The Use of A.I. in the Workplace – Privacy & Confidentiality Concerns
AD Nauseam: The FTC’s Updated Endorsement Guides: Get into the Groove
Webinar Recording – Assessing the Surge in Wiretap Litigation
Machine Learning for Environments with Bad Actors
K&L Gates Triage: Drones and Disruption in the Health Care Field
Health Tech Podcast - Episode 2: Best Practices for Health App Development
Wearables and the Future of Intellectual Property Law
BakerHostetler Partner Paul Karlsgodt Discusses Privacy Class Actions
Polsinelli Podcasts: Cloud Computing, From Cybersecurity to Confidentiality Issues
A Moment of Simple Justice - Forms
The Bill introduces a strong technical framework, yet a weak one in terms of policy and digital rights. On the one hand, the Bill proposes a flexible licensing framework for the adoption of future technologies in the mobile...more
On February 28, 2024, the White House released a highly anticipated and far-reaching Executive Order (EO) that directs several new regulatory steps to limit the transfer of sensitive personal data outside of the United States...more
Consumers use cell phone numbers to authenticate their identities across a variety of accounts, such as those held with wireless providers, financial institutions, healthcare providers, and retail websites. One common example...more
Staffing companies and employers using all tools at their disposal to recruit workers may face increased risk following the Ninth Circuit’s recent opinion in Loyhayem v. Fraser Financial. In Loyhayem, the court found that...more
This is not the first post discussing location-based services on mobile phones. And it won’t be the last. After reading my colleague’s post on the priest who resigned from his high-profile position after his location was tied...more
"Open the pod door, HAL" • Commercial voice-activated intelligent personal assistants from Amazon, Apple, Google, and Microsoft, among others, are growing in popularity. • A report from NPR and Edison Research states...more
We previously cautioned that telephone companies sell customer data to third parties, including location data. Last year, the telecom industry pledged to stop the practice after pressure by members of Congress....more
Wednesday, the U.S. Department of Commerce’s National Telecommunications and Information Administration (NTIA) issued a Request for Comments (RFC) on a new consumer privacy approach that is designed to focus on outcomes...more
I am speaking at a conference in one of my favorite cities (okay, it’s Chicago) and I was having dinner at the bar when the patron next to me asked me what I do for a living. ...more
Talk about a shellacking. In his recent opinion in the latest incarnation of U.S. v. AT&T, U.S. District Court Judge Richard Leon rejected, in no uncertain terms, the U.S. Justice Department’s efforts to block AT&T’s...more
As we reported here last week, the FCC is seeking comment on a number of key issues that were addressed in ACA Int’l. One of these key issues is the definition of the term “called party,” which has the potential to completely...more
There is a global malware campaign that is targeting mobile devices across the world. It is called Dark Caracal, which is believed to be sourced in Beirut by the Lebanese General Security Directorate. ...more
If you have an online account, you are familiar with the username/password method of user authentication. If you have been paying attention to recent news stories, however, you also recognize that this method of...more
You drop your smartphone and now there are a million cracks and you can hardly read your texts. Getting the screen replaced by the manufacturer of the phone is usually expensive and sometimes it is so expensive that it makes...more
University of Michigan researchers have discovered that hundreds of applications in Google Play turn Android phones into a server that allow the user to connect the phone directly to a PC and leave open insecure ports...more
Seyfarth Synopsis: Given the issues workplace texting presents for employers, employers would be wise to make clear in their policies what method of communication employees may use in the workplace for business purposes. If...more
As was expected, President Trump signed into law the rescinding of the broadband privacy regulations adopted in 2016 by the Obama administration’s Federal Communications Commission (FCC)....more
The Federal Communications Commission’s (FCC) Media Relations Office has released a statement announcing Chairman Pai’s intention to stay a data security rule adopted by the Commission late last year in its Broadband Privacy...more
The Indianapolis Colts mobile app is alleged by a putative class to record fans’ private conversations. In the putative class action, the named plaintiff alleges that the mobile app secretly activates the smart phone’s...more
Modern energy companies should pay close attention to the Federal Communications Commission's recent order adopting rules protecting the privacy of customer proprietary information. Although not particularly focused on energy...more
Last week, the Federal Communications Commission (FCC) released landmark protections for internet users, requiring permission from broadband subscribers before broadband providers can collect data on the subscribers’ web...more
TalkTalk, a major UK telecoms company, has been fined £400,000 for a data breach after they were hacked. This is a record fine given by the ICO (the UK’s data protection authority). Significantly the fine was imposed after a...more
The dream of hack-proof communication just got a little closer to reality. On August 16, 2016, China launched the world’s first “quantum satellite,” a project the Chinese government hopes will enable it to build a...more
The Fourth Circuit held that the Government is not required to obtain a warrnt for cell tower data in United States v. Graham, 4th Cir., No. 12-4659, en banc (5/31/16). The Court found that cell tower data was voluntarily...more
It’s official: next Thursday, March 31, 2016, the FCC will vote on a Notice of Proposed Rulemaking seeking comment on a proposed framework for new privacy and data security rules for broadband Internet access service (BIAS)...more