News & Analysis as of

Data Collection Cybersecurity Data Theft

Troutman Pepper

Understanding Access vs. Acquisition - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper on

Each of the 50 states has its own definition of what constitutes a reportable data breach. For some, it requires “unauthorized access” to personal information. For others, it requires “unauthorized acquisition.” And then,...more

Bradley Arant Boult Cummings LLP

Technology at a Price: Risks With Using Biometric Scanning in the Workplace - Labor & Employment Newsletter

Parents who took their children to Disney World in recent years may have been surprised when Disney “cast members” asked the young princes and princesses to place a finger on a scanner before entering the parks. Biometric...more

2 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide