5 Key Takeaways | AI and Your Patent Management, Strategy & Portfolio
(Podcast) The Briefing: The Future of TV? A 2025 Digital Media Trends Analysis
The Privacy Insider Podcast Episode 13: Preserving Privacy and Social Connection with Christine Rosen of the American Enterprise Institute
Great Women in Compliance: Creating Space to Speak Up: The Story Behind Psst.org
JONES DAY TALKS®: Women in IP – AI and Copyright Law Need-to-Knows
No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion
Compliance into the Weeds: The Role of Compliance Going Forward
A Less is More Strategy for Data Risk Mitigation
Third-Party Risk The competitive world of banking struggles to keep up with technological advances, particularly in a regulatory environment.
Investment Opportunities in Italy's Tech Market
The AI Shakeup: New Tech Innovations and the Future of Corporate Law
Regulatory Ramblings: Episode 44 - The Dangers of Non-Technically Trained Lawyers Advising on Technological Matters with Ronald Yu and Donald Day
[Webinar] AI and Data Privacy: Minimizing Risk and Maximizing Opportunity
Tips and Trends in Thought-Leadership Marketing
Guidepost in Motion EP27: Privacy Matters Part 2: “TMI”-The Privacy Dilemma of Social Media
Hospice Innovators: A Conversation with Jaysen Roa, President and CEO of Avow Hospice
Innovation in Compliance - Lessons About Leadership and Security with Paul Clayson
RPA As A Digital Transformation Catalyst
JONES DAY PRESENTS® Digital Health and Clinical Research: Understanding Regulatory Regimes
31 Days to a More Effective Compliance Program - Originating a Compliance Ecosystem
The United States Government Accountability Office (“GAO”) released on April 22nd a report titled: Artificial Intelligence: Generative AI's Environmental and Human Effects (“Report”). See GAO-25-107172....more
Complex investigations are on the rise with investigators being asked to do more with less, therefore needing to gain efficiency to handle workloads. A complex investigation can be triggered by a litigation event, government...more
In 1999, computer scientist Kevin Ashton coined the term “the Internet of Things” (“IoT”) in order to put a name to his idea of using RFID chips to track items as they moved throughout a supply chain. “Though there is no...more
According to the Theft Resource Center and its 2022 data breach reports, data privacy and security threats are impacting all aspects of the healthcare industry – from providers to payers to medical device companies to...more
The adoption of predictive maintenance (PM), an artificial intelligence (AI) driven strategy that anticipates potential equipment failures using Internet of Things (IoT) sensors, holds immense promise for the construction...more
Technological turnover is the process in which technology advancements renders previous iterations obsolete. Each innovation comes with new features, faster computing, and changes in user experience....more
It’s been a long time since facial recognition technology was considered mere science fiction. Today, facial recognition technology has risen in popularity, making it commonplace and easily accessible. Apple’s Face ID was...more
In This Issue - New Privacy Regulations Weaken the Foundation of Smart Cities - New privacy regulations are threatening the full value and promise of smart cities through more stringent requirements for data collection,...more
An Inflection Point for Smart Cities - New privacy regulations are threatening the full value and promise of smart cities through more stringent requirements for data collection, use and sharing. The California Consumer...more
Whether thinking about managing oil and gas, water or other infrastructure facilities, or considering industrial efficiency, robotics and automation, you may be pondering how the Internet of Things (IoT) can be used to...more
On February 27, 2017, news reports disclosed a major security breach involving Spiral Toys, the seller of the CloudPets brand of internet-connected stuffed animals. The Bluetooth-connected CloudPets toys allow users to...more
We’ve written extensively about the numerous lawsuits, dismissals and settlements surrounding the Illinois Biometric Information Privacy Act (BIPA). The statute, generally speaking, prohibits an entity from collecting,...more
Niantic Inc. (Niantic), developer of the mobile game “Pokémon GO,” was sued in Florida court on July 27, 2016. The named plaintiff, David Beckman filed the complaint against Niantic claiming the game’s terms of service and...more
Following the Texas Attorney General’s objection to the sale of RadioShack Corporation’s consumer data as an asset in its bankruptcy, 37 other state attorneys general and a large number of other consumer protection entities...more
On May 25, 2015, the French data protection authority (CNIL) published its annual inspection program for 2015, unveiling its objectives and priorities for the year. This alert highlights the main priorities of the CNIL for...more
To improve customer experience and understand customers’ movements and interactions on their premises, retailers, hotels and other brick-and-mortar businesses increasingly use signals from mobile devices to observe their...more
Social media discovery is now commonplace within civil litigation, with Facebook continuing to be a primary source of potentially-discoverable information. As technology continues to advance, though, the judicial system is...more