The Privacy Insider Podcast Ep. 8: Privacy Over Party: Peter Swire
No Password Required: Founder of Cybersafe Foundation and an Obama Foundation Africa Leaders Fellow, Who Is Comfortable in the API Kitchen
Podcast - Robots, Rights and New Tech: Balancing Innovation and Data Privacy
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 211: Cybersecurity and Privacy Risks for the Healthcare Industry with Brandon Robinson of Maynard Nexsen
The Privacy Insider Podcast Ep. 7: David, Goliath, and Data Privacy Part II: Max Schrems
When AI Meets PI: Assessing and Governing AI from a Privacy Perspective
The American Privacy Right Act (APRA) explained
Navigating the Regulation Jungle: How to Be Compliant, Work Efficiently, and Stay Sane
Healthcare Document Retention
Legal Alert | Wiretap Laws in the United States
Business Better Podcast Episode: Cyber Adviser – A Comparison of AI Regulatory Frameworks
Cost of Noncompliance: More Than Just Fines
Will the U.S. Have a GDPR? With Rachael Ormiston of Osano
No Password Required: MITRE Engage Lead, Innovator in Cyber Deception, and Dance Community Builder
Navigating State Privacy Laws: A Conversation with Oregon & Texas Regulators about Privacy Enforcement
The Team Continues to Grow: A Conversation With Our Newest Colleague, Kaitlin Clemens — Unauthorized Access Podcast
Episode 326 -- Dottie Schindlinger on Diligent's Report on Board Oversight of Cybersecurity Risks and Performance
[Webinar] Midyear Data Privacy Check-in: Trends & Key Updates
Information Security and ISO 27001
Decoding Privacy Laws: Insights for Small to Mid-Sized Businesses — Regulatory Oversight Podcast
On May 15, 2024, the Federal Trade Commission Chair Lina M. Khan appeared before the House Appropriations Subcommittee on Financial Services and General Government to discuss the agency’s FY 2025 budget request and ongoing...more
Everyone is talking about the new rule approved by the Federal Trade Commission on April 23 (published on May 7 and set to take effect – pending legal challenges – on September 4, 2024 ). It is referred to as the...more
MIT Report Details New Cybersecurity Risks - “Cloud misconfigurations, more sophisticated ransomware, and vendor exploitation attacks are contributing to rising cyberattacks.” Why this is important: Worldwide spending...more
How do you protect trade secrets? You take reasonable efforts to maintain the secrecy of the information. As we have outlined in prior installments of this series, taking reasonable efforts to maintain secrecy is a key issue...more
Second Circuit Denies Settlement of Data Breach Case Due to Lack of Standing - As we previously reported, in April 2021, the Second Circuit became the latest federal circuit to hold that an individual may establish Article...more
As we face mounting data breaches and fears over loss of privacy, the article notes that, “as the public opinion evolves and increasingly concludes that merely possessing private data puts consumers at risk, consumers may...more
For many companies, customer information ranks among its most important assets. Yet these days, employees often keep this sensitive customer information in electronic locations that are not readily accessible to or controlled...more
On 4 February 2017, the Cyberspace Administration of China issued a draft of the Network Products and Services Security Review Measures (“Draft Measures”) for public comment: the Draft Measures remain open for comments until...more
Italy is renowned for its rich art, cuisine, history, fashion, and culture; its beautiful coastline and beaches; its mountains; and priceless ancient monuments. In fact, Italy is a top tourist destination and has more World...more
Eleventh Circuit Rejects Application of VPPA to Free App - The latest decision interpreting the application of the Video Privacy Protection Act in the context of twenty-first century technology provides positive news for...more