News & Analysis as of

Confidential Information Data Privacy Data Protection

Foley & Lardner LLP

Artificial Intelligence in Recruitment: It’s Algorithmic, But It May Not Be Private

Foley & Lardner LLP on

The past few years have seen a sharp increase in the use of artificial intelligence (AI) across a variety of industries and workplaces. Many businesses have implemented AI to help streamline the recruitment and hiring process...more

BakerHostetler

Reimagining Data in the Wave of AI

BakerHostetler on

Partner Janine Anthony Bowen explores data-related issues in technology contracts in the age of GenAI....more

Mitratech Holdings, Inc

[Webinar] Data Security Secrets for HR: Background Screening, I-9, & Beyond - March 6th, 1:00 pm CST

Mitratech Holdings, Inc on

In this webinar, discover why data security is more than a checkbox and gain insights into the risks and best practices that can safeguard your organization. Join industry experts as they delve into the risks, laws and...more

Bowditch & Dewey

How to Protect Your Company in the New World of AI

Bowditch & Dewey on

The new technology advancement using artificial intelligence (“AI”), ChatGPT (Chat Generative Pre-Trained Transformer) is a computer model that uses machine learning to generate relevant responses that mimic human-like...more

EDRM - Electronic Discovery Reference Model

[Webinar] Are Large Language Models Like GPT Secure? A Look at the Technology and the Law - September 13th, 1:00 pm - 2:00 pm ET

In an age of digital transformation, the legal industry is increasingly thinking about using AI and Large Language Models (LLMs) like GPT for document review, legal research, and even writing legal briefs. Yet, in our...more

CloudNine

6 Tips for Managing eDiscovery for Access Requests for a State or Local Government Organization

CloudNine on

By Catherine Ostheimer Being responsive to the growing number of Access Requests and DSARS as a local government organization can be daunting. First, there’s the data management challenge. State and local groups generate...more

Health Care Compliance Association (HCCA)

Privacy Briefs: July 2023

A former hospital worker in Arizona was sentenced to 54 months in prison and ordered to pay restitution after pleading guilty to two felony counts involving identity theft and health information disclosure. In the plea deal,...more

Bass, Berry & Sims PLC

NIST Releases Public Draft of Revised Guidelines Aimed at Helping Contractors Protect Sensitive Information

Bass, Berry & Sims PLC on

On May 10, the National Institute of Standards and Technology (NIST) released its initial public draft of SP 800-171, Revision 3, a set of updated guidelines aimed at helping organizations better handle confidential...more

Ankura

Implementing the Sedona Conference on Information Governance: Principles 4-6

Ankura on

The Sedona Conference is a widely known institute that is focused on the study of law and policy in many areas including Information Governance (IG). The Sedona Conference Commentary on Information Governance provides 11 IG...more

Association of Certified E-Discovery...

Legal AI Series [Chapter Eight]: AI-Powered Redaction: Protect Your Docs, and Media, Too

So far, our discussions about the AI legal revolution have revolved around the many ways artificial intelligence is helping to combat the unstructured data crisis looming over the legal industry. However, one area we’ve yet...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, Volume 3, Issue 6

Massachusetts-Based Background Check Company Creative Services Faces Multiple Lawsuits Over Data Breach - "'CSI determined that certain files dating from November 2018 to November 2021 may have been copied from their...more

Amundsen Davis LLC

It May Become More Difficult for Employers to Legally Protect their Confidential and Proprietary Data

Amundsen Davis LLC on

Despite the ever increasing concerns over privacy and data breaches, both externally and internally, it may become more difficult for employers to legally protect their confidential and proprietary information...more

Blank Rome LLP

[Ongoing Program] Protecting Information from Insider Threats and External Hacker - February 22nd, 12:00 pm - 12:30 pm ET

Blank Rome LLP on

Join Us for Protecting Trade Secrets & Gaining a Competitive Edge in the Digital Age - Sophisticated Strategies to Protect Critical Assets When Key Employees Depart & Business Relationships Break Down - The protection...more

Butler Snow LLP

What Lawyers Need to Know About Cybersecurity | Dennis Van Metre | Texas Appellate Law Podcast

Butler Snow LLP on

As technology becomes more sophisticated, so too do the security issues its users encounter. These challenges impact attorneys and law firms particularly, as they regularly deal with confidential data and privileged...more

Fisher Phillips

NFTs Aren’t Just Revolutionizing Art, Sports, and Videogames – They’re Changing the Future of Employment

Fisher Phillips on

NFTs – or non-fungible tokens – are increasingly popular among artists, sports figures, and the video game industry. But NFTs (some selling for upwards of eight figures) are not just for gamers, Mark Cuban, and the ultra...more

Fisher Phillips

7 Steps to Address Privacy Concerns Arising with the Remote “Invisible Workforce”

Fisher Phillips on

As remote work continues, employers have begun to characterize remote workers as the “invisible workforce” – because remote workers are not able to be seen or monitored in the same way as those performing in-person work. The...more

Proskauer - Minding Your Business

Lessons from Wengui v. Clark Hill: Structuring a Two Track Cyber Investigation

As the D.C. District Court in Wengui v. Clark Hill recently commented, “[m]alicious cyberattacks have unfortunately become a routine part of our modern digital world. So have the lawsuits that follow them….” The court’s...more

Baker Donelson

Data Privacy Day: Top Considerations for 2021

Baker Donelson on

Happy Data Privacy Day! Since 2007, privacy professionals from across the globe have gathered together on January 28 to raise awareness about data privacy and security best practices and issues. ...more

Poyner Spruill LLP

Court Compels Discovery of Cyber Expert Report in Litigation

Poyner Spruill LLP on

A federal court has held that neither the work product nor attorney-client privilege doctrines shield a cyber expert’s report from discovery....more

Fisher Phillips

Trade Secret Protection With A Remote Workforce: 7 Practical Considerations for Employers

Fisher Phillips on

The COVID-19 remote work era is now in its tenth month, and employees continue to work away from the physical office, without in-person supervision, and perhaps outside of the company network. During this time, many employees...more

Fisher Phillips

Will Supreme Court Enforce Law And Order In The Digital Workplace?

Fisher Phillips on

Now entering its ninth month in the United States with no sign of slowing down, the COVID-19 pandemic has forced many employers to make permanent changes to business operations in order to survive. Among the most noticeable...more

Fisher Phillips

Not If But When: Cybercrime Targets Telework

Fisher Phillips on

As a result of the COVID-19 pandemic, millions of Americans have deserted the physical workplace. Modern technology and remote access capabilities have made it possible to transform almost any job to a telework position. As...more

Baker Donelson

Sitting with the C-Suite: Looking Ahead to Potential Compliance Issues Due to COVID-19

Baker Donelson on

Ian Campbell, the President and CEO of iCONECT, has a design background and, prior to founding iCONECT, he worked in advertising and founded his own agency. In 2012 iCONECT launched its flagship review product, Xera, which...more

Searcy Denney Scarola Barnhart & Shipley

Protecting Patient Medical Records

Patient medical records and how consumers can best preserve them. Do the records belong to the patient or to the doctor or hospital? Why is it important to maintain your own medical records? ...more

Fenwick & West LLP

Top Work-at-Home Privacy and Security Challenges and Return-to-Work Safeguards in the COVID-19 Crisis

Fenwick & West LLP on

The results of recent Fenwick polling suggest that companies generally have insufficient remote-working security controls and data protection practices and are considering a variety of approaches to return-to-work safeguards....more

56 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide