News & Analysis as of

Email Data Privacy

DLA Piper

Italy: The Garante Issues First GDPR Fine Over Employees Email Metadata Privacy Breach

DLA Piper on

The Italian Data Protection Authority (the Garante) has issued its first GDPR fine for, among other breaches, unlawful retention of metadata from employees’ emails and web browsing activities. The decision applies, for the...more

Perkins Coie

Class Action Lawsuit Over Marketing Email Tracking Pixels Dismissed by Federal Court

Perkins Coie on

Key Takeaways - - At least four courts have now held that retailers using email for marketing are not considered “communication service providers” and therefore are not subject to TUCSRA. - At least five courts have now held...more

HaystackID

[Webinar] Faster Finds, Fewer Files: A Smarter Approach to Email Investigations - May 21st, 11:00 am CDT

HaystackID on

Email remains one of the most critical and challenging data sources in investigations. Whether responding to cybersecurity incidents, managing eDiscovery demands, or handling regulatory audits, organizations have to quickly...more

A&O Shearman

Business email compromise and invoice fraud – a duty of care on the innocent?

A&O Shearman on

The Western Australian District Court’s recent decision in Mobius Group Pty Ltd v Inoteq Pty Ltd1 highlights the potential consequence for the innocent party where fraudulent changes in bank details are sent from their...more

Holland & Knight LLP

Texas Case Offers Lessons Learned from Data Requests and Criminal Causes of Action

Holland & Knight LLP on

In Angelyn A. Olson et al. v. The Consilio LLC, et al. filed in Tarrant County, Texas, plaintiff Angelyn Olson alleged that she was involved in other litigation during which an e-discovery service provider (Consilio) was...more

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

Bradley Arant Boult Cummings LLP

Merely Copying In-House Counsel Does Not Necessarily Establish Attorney-Client Privilege

Businesses who employ in-house attorneys frequently assume that copying their lawyer on internal communications shields the communications from discovery because of the attorney-client privilege. In 1981, the U.S. Supreme...more

Bricker Graydon LLP

Scammers, SSNs, and Smelling Funny

Bricker Graydon LLP on

I was hanging out with my friend this weekend, both catching up on emails from a coffee shop. After a while, he turned to me. “Well sh*t. Looks like my social security number might be on the dark web.”...more

BakerHostetler

Data Security, Commercial Email and Employee Reviews Walk into a Bar...

BakerHostetler on

Sorry folks, there is no punchline here, but there are bottom lines from a settlement the Federal Trade Commission (FTC) announced last week. We discuss three today: (1) the FTC continues to mount broad investigations and...more

McDermott Will & Emery

Private Nutzung von Internet und E-Mail am Arbeitsplatz: Endlich mehr Sicherheit fĂĽr Arbeitgeber?

McDermott Will & Emery on

Private Nutzung von Internet und E-Mail am Arbeitsplatz: Endlich mehr Sicherheit für Arbeitgeber? Nach bisheriger Auffassung der deutschen Datenschutzbehörden ist der Arbeitgeber bei gestatteter Privatnutzung von...more

EDRM - Electronic Discovery Reference Model

Optimizing the Remote Reach: Strategies for Secure and Efficient Data Collection

The digital revolution has irrevocably transformed the way we conduct business, and investigations are no exception. The surge in remote work models has rendered traditional on-site data collection methods increasingly...more

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

Klein Moynihan Turco LLP

FTC Health Data Privacy Crackdown Continues

On April 11, 2024, Monument, Inc. (“Monument”), settled claims brought by the Federal Trade Commission (“FTC”) alleging that it had committed certain health data privacy law violations. Monument provides online addiction...more

K&L Gates LLP

Employment Practices and Data Protection: Monitoring Workers 101

K&L Gates LLP on

The Information Commissioner’s Office (ICO) has recently published guidance for employers on monitoring workers lawfully, transparently and fairly. The guidance aims to protect workers’ data protection rights and help...more

Good2bSocial

AI in Legal Marketing: How to Leverage this Powerful New Technology for Your Next Campaign

Good2bSocial on

If you pay much attention to the digital space, then you know AI is here to stay. More than a passing fad, AI tools are proving to be market disruptors that we should all plan to use in the coming years...more

TransPerfect Legal

Chatting without Penalty: The Evolving Role of Instant Messaging in Legal Matters

TransPerfect Legal on

I. The Phenomenon of Instant Messaging- Evolution and Proliferation- From basic platforms like IRC and AIM to globally dominant apps such as WhatsApp and Telegram, instant messaging (IM) has witnessed a radical...more

Ankura

The Executive's Guide to Harnessing GPT's Unparalleled Intelligence

Ankura on

The digital age has generated an unprecedented data influx threatening even the most formidable enterprises. The challenges are no longer just about competition or market share; it is a battle against time, complexity, and...more

Davies Ward Phillips & Vineberg LLP

Ownership of Privileged Communications in M&A Transactions: Practical Takeaways and Recent Case Law

Traduction en cours. Can the buyer in a M&A transaction who takes possession of the seller’s or target company’s privileged communications on closing use those communications in a post-closing dispute against the seller?...more

StoneTurn

eDiscovery and Forensic Investigations: Six Tips for Managing Company Messaging Protocols

StoneTurn on

The world of workforce communication looks vastly different from 2020, including an increased blur between personal and business communications due to remote work environments and access to instant messaging and...more

Davis Wright Tremaine LLP

Connecticut Expands Regulation of Consumer Data Privacy

The Connecticut legislature passed and the governor recently signed amendments to the Connecticut Data Privacy Act (CTDPA), the state's comprehensive consumer data privacy law, which goes into effect July 1, 2023. Some...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 3, March 2023

Amazon Sued for Not Telling New York Store Customers about Tracking Biometrics - “Thanks to a 2021 law, New York is the only major American city to require businesses to post signs letting customers know they’re tracking...more

Legal Internet Solutions Inc.

One More Thing from 2022 with Team LISI

Hey, podcast listeners. I am Taryn Elliott, director of client success and marketing at LISI, and this is LISI’s All the Things podcast. Team LISI is in the hot seat for this month’s episode of One More Thing. Robyn Addis,...more

Woodruff Sawyer

Scams and Viruses: Which Email Attachments Are Safe to Open?

Woodruff Sawyer on

Email scams and viruses are nothing new—threats like phishing emails and malware have been around since the days when services like AOL still dominated the internet and email landscape. However, while technology has made a...more

J.S. Held

How to Avoid the Most Common Causes of Cybersecurity Incidents

J.S. Held on

Cybercrime is at an all-time high, with just the cybercrime insurance industry alone expecting to grow from $8 billion globally in 2020 to $20 billion by 2025.1 Although cyber liability insurance policies now exist to help...more

Bass, Berry & Sims PLC

Privacy Peril: Back It Up

Bass, Berry & Sims PLC on

A recent Privacy Peril advised of the increasing cyber risk from nation state attacks, particularly as a result of the war in Ukraine. There is, of course, little we can do to thwart cyber assaults on vital nerve centers....more

94 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide