Regulatory vs. Business Compliance
Fintech Focus Podcast | Navigating IT and Security Risks in Fintechs in Light of Impending DORA Deadline
On-Demand Webinar: Bring Predictability to the Spiraling Cost of Cyber Incident Response Data Mining
Episode 347 -- LRN's Code of Conduct Survey
Workplace Investigation Protocols: One-on-One with Greg Keating
The Election's Impact on the FTC Will Bring Big Changes, But Being Vigilant Must Remain a Priority
Harnessing Generative AI: Innovations and Best Practices — The Good Bot Podcast
Innovation in Compliance: Navigating Risk Management in the Automotive Industry with Tom Kline
Effective Compliance Training
Compliance Tip of the Day: Board Questions and Metrics for 3rd Party Risk Management
AI Washing: Simple Guidance to Avoid Risk
Webinar ¦ Benefits of Using AI in Construction
The Future of AI Regulation and Legislation: 5 Key Takeaways
Episode 342 -- How to Conduct an Internal Compliance Site Visit and Review
Why Privacy is Your Secret Weapon Against Third-Party Risk
Due Diligence in AI: 3 things you need to survive AI scrutiny
Enhancing Compliance: The Power of Independent Monitorships in Consumer Protection — Regulatory Oversight Podcast
Investigations and Cognitive Interviews
Consumer Finance Monitor Podcast Episode: Regulators Escalate Focus on the Risks of Bank Relationships with Fintechs and Other Third Parties
Fraud Prevention Techniques for Nonprofit Organizations - Part 3
We are pleased to inform you about a recent development in the Illinois Biometric Information Privacy Act (BIPA) law that could significantly impact businesses using biometric data. Last week, in the case of GT v. Samsung...more
As previously noted, the Illinois Biometric Information Privacy Act (BIPA) has invited a great deal of litigation, often resulting in interpretations favorable toward plaintiffs. As a result, we advise employers who use...more
Illinois Supreme Court Allows Massive Damages in Biometric Privacy Cases - “The case involves Ohio-based fast-food company White Castle.” Why this is important: Illinois has the strictest biometric privacy law in the...more
Biometric technology data is generated more frequently these days in private and professional settings as authentication methods like fingerprint scanning, facial recognition, and voice recognition are becoming standard on...more
Just a few years ago, the thought of employees being able to “punch in” at work using their fingerprint seemed like pure science fiction. Today, fingerprint-based biometrics is widely used as a go-to method for organizational...more
Volvo’s owner, Li Shufu, is mulling over a move to combine the carmaker with his publicly traded Geely Automobile Holdings—a play that would take Volvo public and “unify the bulk of billionaire Li’s growing stable of...more
We only have one unique face, two irises and ten fingerprints. We can’t change our biometrics like we can a credit card number. Yet many companies are collecting and using their employees’ and our biometric information for...more
There is a growing trend to regulate biometric data and severely punish companies that do not adequately protect this data. Every company that collects or uses biometric data should be careful to ensure compliance with...more
Advancements in technology have made it possible for more companies to use biometric data to streamline their business, improve security and workplace efficiency, and offer new services and features to customers. ...more
A new ransomware, dubbed “Ryuk,” has surfaced in the last few weeks and is said to be targeting large organizations in the United States. The attackers behind Ryuk have reportedly made more than $640,000 in just two weeks,...more
Since its enactment a decade ago, the Illinois Biometric Information Privacy Act (BIPA) has seen a recent spike in attention from employees and consumers alike. This is due, in large part, to the technological advancements...more
Dear Littler: We are going to replace the punch-card timeclocks in our U.S. facilities with timeclocks that allow employees to “clock in” each day using their fingerprint. I’ve read about a flood of recently filed class...more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more
While the privacy world is focused on the Equifax data breach, another development is taking place that could have a more lasting effect on privacy law. In the last month, plaintiffs’ lawyers in Illinois have filed over 20...more
Brought about by an obscure state law passed nearly a decade ago—the Illinois Biometric Information Protection Act (740 ILCS 14/1)—the next wave of privacy class action litigation is here and in full-swing. While an Illinois...more
Seyfarth Synopsis: A string of recent class action lawsuits regarding businesses’ use of employees’ biometric data should put employers on heightened alert regarding compliance with various state biometric privacy laws....more