Biometric Litigation
DE Under 3: FTC Enters the Biometric Privacy Protection Conversation
Digital Planning Podcast Episode: Understanding Biometrics and the Impact on Estate Planning
Illinois Supreme Court Clarifies BIPA Violation Accruals, Opening the Door for “Annihilative” Damage
Podcast: BIPA Trends in 2022
Immigration Insights Podcast: International Entrepreneur Parole Program & Biometrics Requirement
JONES DAY PRESENTS® The Impact of Digital Health on Research and Clinical Trials
#BigIdeas2020: Facial Recognition Technology and Employer Compliance - Employment Law This Week® - Trending News
5 Key Takeaways | Biometrics: Identifying and Mitigating Legal Risks
On December 20, the Federal Trade Commission (FTC or “the Commission”) published a notice of proposed rulemaking (NPRM) proposing amendments to the Children’s Online Privacy Protection Rule (the “COPPA Rule” or the “Rule”)....more
After more than two years of litigation, Amazon and Microsoft won summary judgment in two class action lawsuits asserting violations of the Illinois Biometric Information Privacy Act (BIPA): Vance v. Amazon.com, Inc., Case...more
CYBERSECURITY - Apple + Microsoft Release Patches for Identified Vulnerabilities - This week, both Apple and Microsoft issued patches to fix serious zeroday vulnerabilities that should be applied as soon as possible. That...more
CYBERSECURITY - Cisco/Talos Researchers Find Attackers Using Slack and Discord to Distribute Malware - Another example of the resiliency and creativity of cyber-attackers is outlined in a new blog by Cisco/Talos...more
U.S. Judge Halts Trump's TikTok Ban, Hours Before It was Set to Start - "John Hall, an attorney for TikTok, said that the app, with some 100 million American users, is a 'modern day version of the town square' and shutting...more
If a picture of your face is used for a purpose that doesn’t identify you, is your privacy violated? If the publicly available picture was used just to show a face, distinguished from some faces, similar to others, and fed...more
Security researchers Intezer and IBM X-Force have identified a new ransomware that is seriously vicious. It’s PureLocker—named because it is programmed in PureBasic language, which is apparently unusual. ...more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more