Podcast - Decoding the Future of AI Regulation and Frontier Models
The Privacy Insider Podcast Ep. 8: Privacy Over Party: Peter Swire
No Password Required: Founder of Cybersafe Foundation and an Obama Foundation Africa Leaders Fellow, Who Is Comfortable in the API Kitchen
Podcast - Robots, Rights and New Tech: Balancing Innovation and Data Privacy
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 211: Cybersecurity and Privacy Risks for the Healthcare Industry with Brandon Robinson of Maynard Nexsen
The Privacy Insider Podcast Ep. 7: David, Goliath, and Data Privacy Part II: Max Schrems
When AI Meets PI: Assessing and Governing AI from a Privacy Perspective
Navigating Emerging Privacy Issues in Financial Services — The Consumer Finance Podcast
The Privacy Insider Podcast Episode 4: Don't Be Evil: In the Hot Seat of Data Privacy, Part 1
The American Privacy Right Act (APRA) explained
Navigating the Regulation Jungle: How to Be Compliant, Work Efficiently, and Stay Sane
Legal Alert | Wiretap Laws in the United States
Business Better Podcast Episode: Cyber Adviser – A Comparison of AI Regulatory Frameworks
Preventative Medicine: Health Care AI Privacy and Cybersecurity – Part 1 — The Good Bot Podcast
Cost of Noncompliance: More Than Just Fines
Will the U.S. Have a GDPR? With Rachael Ormiston of Osano
The Team Continues to Grow: A Conversation With Our Newest Colleague, Kaitlin Clemens — Unauthorized Access Podcast
[Webinar] Midyear Data Privacy Check-in: Trends & Key Updates
Decoding Privacy Laws: Insights for Small to Mid-Sized Businesses — Regulatory Oversight Podcast
No Password Required: Education Lead at Semgrep and Former Czar for Canada’s Election Security
Unauthorized Access, Troutman Pepper's privacy and cybersecurity-focused podcast, spotlights the human aspect of the cybersecurity industry, introducing you to the remarkable personalities that make the industry amazing....more
In the rapidly moving world of business today, every second counts. The ability to locate pertinent information before it becomes inaccessible can determine the outcome of your endeavors. With In-Place Search, you can...more
While the cloud has become commonplace in our everyday lives, many legal teams are still missing out on the benefits of cloud-based ediscovery software. As of 2021, there is a 50/50 split between ediscovery solutions...more
Across the country, states are investing in organizations and cross-departmental offices responsible for collecting, managing, integrating and analyzing health system data to provide policymakers, regulators, researchers and...more
Editor’s Note: On October 19, 2022, HaystackID shared an educational webcast on the potential impact of Apple’s iOS 16 release on the area of eDiscovery. With iOS 16, new chat manipulation and security features have gone...more
On November 1, 2021, the Federal Communications Commission (FCC) announced the launch of the Reassigned Numbers Database (RND). This centralized database is an important development for businesses across industries that are...more
The Black Shadow hacking group’s attack on Cyberserve, reported a few days ago, has resulted (at this point in time) in the leaking of a database with more than 800,000 records pertaining to various individuals and the...more
As a thought experiment, imagine there was a base metal as scarce as gold but with the following properties: boring grey in color, not a good conductor of electricity, not particularly strong but not ductile or easily...more
SCOTUS: Accessing Private Database for Improper Purpose Not Violation of Computer Fraud and Abuse Act. In a recent Supreme Court case, Van Buren v. United States, the Court narrowed the applicability of the Computer Fraud...more
Blockchain technology is widely anticipated to disrupt major industries and business operations over the next several years. But with all of the “hype” in the blockchain market, at times it can be difficult to separate fact...more
Social media contact lists have become an increasingly important part of a business’s customer lists. While courts are still grappling with who legally “owns” the data that the employee acquired on the employer’s dime—such...more
After the killing of Qassem Soleimani on January 3, 2020, by the U.S. government, the cybersecurity news industry has been abuzz about whether Iran will engage in cyber terrorism, and if so, to what degree, as part of its...more
More than a year ago, in April 2018, police announced that they had used a new investigative technique to arrest a man known as the Golden State Killer. For the first time, the police submitted DNA from a crime scene into a...more
Companies are reminded that during the first 15 labor days of August claims by holders must be submitted before Colombia's Superintendence of Industry and Commerce (SIC) for the first semester of 2019... Please find below...more
A todos los interesados se les recuerda que de conformidad con lo establecido mediante el Decreto 090 del 18 de enero de 2018, las sociedades y entidades sin ánimo de lucro que tengan activos totales superiores a 610.000...more
Interested parties are reminded that due to Decree 090 of Jan. 18, 2018, legal corporations and nonprofit companies with assets that exceed 610.000 Tax Value Units (TVU), equivalent to approximately $20.225 million Colombian...more
We have all been cautioned so often about the risks of opening malware-infected email attachments, or clicking on fraudulent links embedded in an email, we can become desensitized to the actual danger. We think "surely, in...more
On December 28, 2016, the New York Department of Financial Services ("DFS") released a revised version of a proposed regulation that would require banks, insurance companies, and other financial services institutions...more
As discussed in a previous post on facial recognition technology, a putative class action has been filed against Facebook over the collection of “faceprints” for its online photo tagging function, Tag Suggestions. (See e.g.,...more
On September 14, 2015, the OIG released a Public Summary Report finding that although CMS had implemented controls to secure the Multidimensional Insurance Data Analytics System (MIDAS) and consumer personally identifiable...more