If you are a compliance professional for a U.S.-based company, you have probably been told at some point that you have to worry about the General Data Protection Regulation (GDPR). Have you encountered one of these...more
4/23/2025
/ Compliance ,
Consumer Privacy Rights ,
Data Collection ,
Data Privacy ,
Data Protection ,
EU ,
General Data Protection Regulation (GDPR) ,
International Data Transfers ,
Jurisdiction ,
Personal Data ,
Personal Information ,
Popular ,
Regulatory Requirements
Employers have long used in-cab cameras for a variety of concerns, including protecting the driver and the public from accidents resulting from inattentive driving. Reviewing the recordings serves as a valuable training tool...more
Companies in all industries and of all sizes are evaluating sophisticated and useful technology for their websites and applica- tions (their “apps”) in an effort to enhance and develop their image or brand and to support...more
8/29/2023
/ Consent ,
Cookies ,
Cybersecurity ,
Data Protection ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Healthcare ,
Information Technology ,
Invasion of Privacy ,
Mobile Apps ,
PHI ,
Risk Management ,
Tracking Systems ,
Web Tracking ,
Websites ,
Wiretapping
As companies look to innovative and useful technology to enhance their brand development and the marketing and sales of products or services, they need to remain cautious of how these tools—advancing at a lightning...more
In today’s virtual world so much has changed – we work from home, we attend meetings from home, and now, many companies are hiring from home. Virtual interviewing is on the rise, and for good reason. Companies can interview...more
6/9/2022
/ Artificial Intelligence ,
Biometric Information ,
Cyber Incident Reporting ,
Data Privacy ,
Employer Liability Issues ,
Interviews ,
Screening Procedures ,
State Labor Laws ,
Virtual Meetings ,
Wage and Hour ,
Written Consent
Companies continue to see headlines about cyberattacks, but manufacturing companies, specifically, have become more targeted in the last few years. In the most recent issue of The Illinois Manufacturer, Molly Arranz and Sofia...more
2/24/2022
/ Cyber Attacks ,
Cybersecurity ,
Information Technology ,
Internet of Things ,
Manufacturing Facilities ,
Popular ,
Ransomware ,
Supply Chain ,
Technology Sector ,
Training ,
Unauthorized Access