News & Analysis as of

Confidential Information Personal Information

Offit Kurman

Insulate Your Marriage From Problems Online

Offit Kurman on

The Greek philosopher Socrates once said, “When the debate is lost, slander becomes the tool of the loser.” He was lucky he didn’t live in the age of Facebook. Thanks to the vast social network, it has never been easier to...more

Orrick, Herrington & Sutcliffe LLP

OIG makes seven recommendations for CFPB following major incident

On May 5, the OIG for the Fed authored a report with several recommendations for the CFPB following a major security incident regarding confidential supervisory information (CSI). The OIG issued four findings with seven...more

EDRM - Electronic Discovery Reference Model

When AI Gets Personal: Legal Implications of Artificial Intimacy

ComplexDiscovery Editor’s Note: Emotional bonds with AI are no longer speculative—they’re shaping user behavior and redefining the risks legal professionals must address. This thoughtful exploration of artificial intimacy...more

Jackson Lewis P.C.

Insider Threats: The Overlooked Risks of Departing Employees and Sensitive Data Theft

Jackson Lewis P.C. on

Insider threats continue to present a significant challenge for organizations of all sizes. One particularly concerning scenario involves employees who leave an organization and impermissibly take or download sensitive...more

A&O Shearman

Germany: Immediate dismissal of board member for email forwarding to personal account

A&O Shearman on

During an investigation, it is not uncommon to discover that an individual has forwarded business emails to their private email address. This ruling from the Higher Regional Court Munich shows the potential implications of...more

TNG Consulting

Tip of the Week: BIT Standards for Higher Education – Standard 7 

TNG Consulting on

As part of our series on NABITA’s Industry Standards for Behavioral Intervention Teams, we will focus on Standard 7, which deals with the intersection of behavioral intervention and confidentiality. This standard emphasizes...more

Robinson+Cole Data Privacy + Security Insider

David’s Bridal Hit with Class Actions Over Two Data Breaches

This week, two class actions were filed in the U.S. District Court for the Eastern District of Pennsylvania against David’s Bridal based on two data breaches. The actions allege that David’s Bridal failed to protect the...more

Jackson Lewis P.C.

AI Notetakers – Evaluating the Risks Along with the Benefits

Jackson Lewis P.C. on

The explosion of generative AI has spawned a wide range of personal and professional tools and applications. One noteworthy (no pun intended) example of those tools and applications is notetakers that can capture, transcribe,...more

A&O Shearman

Discord about access to court file between UPC Court of First Instance Divisions

A&O Shearman on

Important decisions abound as the UPC navigates the still often unchartered waters of its Rules of Procedure (RoP). We recently discussed two orders by the Munich Division where third-party access requests based on...more

K2 Integrity

A Strong Foundation: Safeguarding The Construction Industry In The Digital Age

K2 Integrity on

The adoption of new and advanced technologies has allowed for a digital transformation across business industries. Infrastructure and services supported by technologies such as artificial intelligence (AI), advanced analytics...more

Patterson Belknap Webb & Tyler LLP

Zoom Reverses Course on Contemplated Use of Customer Content to Train Artificial Intelligence

Zoom’s recent reversal on changes to its terms of service illustrates both data security and privacy minefields particular to the growth of generative AI. Previously, the terms of service of the popular videoconferencing...more

Rothwell, Figg, Ernst & Manbeck, P.C.

Why Privacy And Trade Secret Law Are On A Collision Course

Can privacy law and trade secret law coexist, or is compliance with both impossible? We are experiencing the fourth industrial revolution, driven by the rise in data and connectivity, analytics and artificial intelligence....more

Nelson Mullins Riley & Scarborough LLP

EMA Releases Official Guidance for Protecting PPD and CCI in Clinical Trial Filings within the European Economic Area (EEA)

Version 1.1 of the European Medicines Agency's (EMA) “Guidance on how to approach the safeguarding of personal protected data (“PPD”) and commercially confidential information (“CCI”) while using the Clinical Trials...more

Foley Hoag LLP - Security, Privacy and the...

Privacy and Security of Genetic Information: The FTC Is Putting Privacy and Security Promises of DNA Companies to the Test

In the FTC’s first case focused on the privacy and security of genetic information, the FTC alleges that San Francisco-based Vitagene, Inc. – now known as 1Health.io – failed to live up to its promises and unfairly changed...more

Allen Matkins

California Secretary Of State Inadvertently Releases Records Of Forced Sterilizations

Allen Matkins on

The first law signed by California's first Governor, Peter Burnett, was the The Act Concerning the Public Archives (Chapter 1, Statutes of 1850). The act instructed the Secretary of State, William Van Voorhies, to classify...more

Ankura

Implementing the Sedona Conference on Information Governance: Principles 4-6

Ankura on

The Sedona Conference is a widely known institute that is focused on the study of law and policy in many areas including Information Governance (IG). The Sedona Conference Commentary on Information Governance provides 11 IG...more

Foley Hoag LLP - Cannabis and the Law

Illinois Medical Cannabis Businesses Must Be HIPAA Compliant

In recently published guidance, Illinois’ main cannabis regulator – the Illinois Department of Financial and Professional Regulation – announced that medical and co-located dispensaries in Illinois must protect patient...more

Ervin Cohen & Jessup LLP

Mitigating a Company’s Liability When a Data Breach Is Suffered by a Vendor or Service Provider

Data breaches by large companies have been in the news for some time. Over the last several years several companies, including Marriott, Yahoo and Volkswagon, have been victimized by hackers who have broken into a company’s...more

Bass, Berry & Sims PLC

Privacy Peril: What Information We Collect

Bass, Berry & Sims PLC on

In a previous Privacy Peril we told you how miscreants use informal messaging apps to spoof well-respected law firms and other businesses. This tip pointed out the security risks in using these messaging apps to conduct...more

Sheppard Mullin Richter & Hampton LLP

Successful Dismissal of PayPal Class Action Over Breach Disclosures Serves as Risks Reminder

A class action lawsuit filed against PayPal in connection with a breach it suffered in 2017 was dismissed recently because the plaintiffs did not adequately allege PayPal’s intent to deceive investors. The litigation began...more

Jackson Lewis P.C.

CDC Expands Guidance On Workplace SARS-CoV-2 Testing To Require Informed Consent

Jackson Lewis P.C. on

As employers continue to grapple with a safe return to the workplace, on January 21, the U.S. Center for Disease Control and Prevention (CDC) issued new guidance for businesses and employers on SARS-CoV-2 testing of...more

McDermott Will & Emery

Uber Criminal Complaint Raises the Stakes for Breach Response

On August 20, 2020, a criminal complaint was filed charging Joseph Sullivan, Uber’s former chief security officer, with obstruction of justice and misprision of a felony in connection with an alleged attempted cover-up of a...more

McDermott Will & Emery

California Bill Would Make Taxpayer Information Available to the Public (Seriously!)

McDermott Will & Emery on

A concerning bill is pending in the California Senate. SB-972 would require the California State Controller’s Office (the Controller) to make taxpayer information publicly available. The bill would require that the Controller...more

Epiq

Travel Days May Be Postponed, But When it Comes Back, Be Prepared to Protect Sensitive Data

Epiq on

While travel may be currently stalled due to COVID-19 concerns, as soon as travel resumes, border controls and restrictions will likely increase. Often, the phrase “border search” produces thoughts of seeking and seizing a...more

Harris Beach Murtha PLLC

Can Hackers be Ethical, not Evil?

We are increasingly seeing situations in which a client’s information systems are breached by an ethical hacker. Typically, they take a screen shot or two of data to prove their accomplishment, carefully redact any...more

25 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide