5 Key Takeaways | AI and Your Patent Management, Strategy & Portfolio
(Podcast) The Briefing: The Future of TV? A 2025 Digital Media Trends Analysis
The Privacy Insider Podcast Episode 13: Preserving Privacy and Social Connection with Christine Rosen of the American Enterprise Institute
Great Women in Compliance: Creating Space to Speak Up: The Story Behind Psst.org
JONES DAY TALKS®: Women in IP – AI and Copyright Law Need-to-Knows
No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion
Compliance into the Weeds: The Role of Compliance Going Forward
A Less is More Strategy for Data Risk Mitigation
Third-Party Risk The competitive world of banking struggles to keep up with technological advances, particularly in a regulatory environment.
Investment Opportunities in Italy's Tech Market
The AI Shakeup: New Tech Innovations and the Future of Corporate Law
Regulatory Ramblings: Episode 44 - The Dangers of Non-Technically Trained Lawyers Advising on Technological Matters with Ronald Yu and Donald Day
[Webinar] AI and Data Privacy: Minimizing Risk and Maximizing Opportunity
Tips and Trends in Thought-Leadership Marketing
Guidepost in Motion EP27: Privacy Matters Part 2: “TMI”-The Privacy Dilemma of Social Media
Hospice Innovators: A Conversation with Jaysen Roa, President and CEO of Avow Hospice
Innovation in Compliance - Lessons About Leadership and Security with Paul Clayson
RPA As A Digital Transformation Catalyst
JONES DAY PRESENTS® Digital Health and Clinical Research: Understanding Regulatory Regimes
31 Days to a More Effective Compliance Program - Originating a Compliance Ecosystem
As we navigate the complex landscape of technology and its impact on society, considering how our digital interactions shape our identities and communities is crucial. The shift towards virtual third spaces—like social media...more
On February 20 2025, the Information Commissioner’s Officer (the ICO) published the third edition of the Tech Horizons Report (the Report). The Report identifies four new technologies expected to emerge over the next 2 to 7...more
It is hard to believe that we are starting the 25th year of the 21st century. The rapid evolution that technology, privacy and data security have undergone these last 25 years is mindbending. Yet, as we enter 2025, it still...more
Artificial intelligence (AI) tools continue to proliferate, with many aiming to automate processes and increase productivity. But customers of these tools or customers of vendors who use them must understand what’s going on...more
According to the Theft Resource Center and its 2022 data breach reports, data privacy and security threats are impacting all aspects of the healthcare industry – from providers to payers to medical device companies to...more
In late May, the Federal Trade Commission sought an injunction in the Northern District of California against Edmodo, which has historically offered school districts a virtual classroom platform with tools for assignments,...more
Your biometric data tells the tale of who you are in intricate detail. Often, your biometric data is used to verify your identity at work or school. Currently, Illinois has the most comprehensive biometric privacy law in the...more
Most biometric readings require your presence in the same space as the measuring tools. Facial recognition, retinal capture, fingerprints or hand geometry, even biomarked scents are measured in close physical proximity. The...more
With many employers embracing new technology to achieve efficiencies in the workplace, companies using increasingly popular biometric programs must take steps to ensure that the use of these systems does not violate the law...more
We’ve written extensively about the numerous lawsuits, dismissals and settlements surrounding the Illinois Biometric Information Privacy Act (BIPA). The statute, generally speaking, prohibits an entity from collecting,...more
Manufacturers with operations, employees, and/or customers in China must be aware of a long list of China-specific data-flow and content restrictions. Data-flow restrictions in particular affect manufacturers employing or...more