Biometric Litigation
DE Under 3: FTC Enters the Biometric Privacy Protection Conversation
Digital Planning Podcast Episode: Understanding Biometrics and the Impact on Estate Planning
Illinois Supreme Court Clarifies BIPA Violation Accruals, Opening the Door for “Annihilative” Damage
Podcast: BIPA Trends in 2022
Immigration Insights Podcast: International Entrepreneur Parole Program & Biometrics Requirement
JONES DAY PRESENTS® The Impact of Digital Health on Research and Clinical Trials
#BigIdeas2020: Facial Recognition Technology and Employer Compliance - Employment Law This Week® - Trending News
5 Key Takeaways | Biometrics: Identifying and Mitigating Legal Risks
“After a one-day trial in the Circuit Court for Montgomery County, a jury found Craig Donnell Johnson guilty of robbery. Before trial, Mr. Johnson had filed a motion to dismiss the case, arguing that the State had withheld...more
Feeling seen, but maybe too seen - Stepping off the plane this past August after a long international flight, the last thing I wanted was a lengthy wait at US Customs, the final sentinel between me and a good night’s sleep. I...more
In the not-so-distant past, data risk was primarily seen as a technology challenge. How can organizations store all the data they accumulate? How can they sort and analyze it? How can they protect it from exfiltration by...more
For the past several years, we have periodically reported regarding the proliferation of class actions and other litigation under the Illinois Biometric Information Privacy Act (BIPA)...more
Crosmun v. The Trustees of Fayetteville Technical Community College Provides Much Needed Guidance to NC Courts on How to Properly Craft eDiscovery Protocols - The Court of Appeals decision in Crosmun is important because...more
Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more
Discussions about “blockchain” technology seem to be everywhere these days, with potential applications spanning industries as diverse as banking, healthcare, real estate, law enforcement, entertainment, and even wine and...more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more