Key Discovery Points: Don’t Get Caught with Your Hand in the Production Cookie Jar
How Startups Can Comply With Ever-Changing Privacy Laws
The Privacy Insider Podcast Episode 15: TAKE IT DOWN: Online Abuse and Harassment with Carrie Goldberg of C.A. Goldberg, PLLC
Facial Recognition and Legal Boundaries: The Clearview AI Case Study — Regulatory Oversight Podcast
State AGs Unite: New Privacy Task Force Signals Shift in Regulatory Power Dynamics — Regulatory Oversight Podcast
The Privacy Insider Podcast Episode 14: The Pig Around the Corner: Privacy and Trade with Constantine Karbaliotis of nNovation LLP
State AG Pulse | Massive Google Settlement Shows AGs Serious About Privacy
State AGs Unite: New Privacy Task Force Signals Shift in Regulatory Power Dynamics — The Consumer Finance Podcast
Business Better Podcast Episode: Bridging Campuses: Legal Insights on Education Industry Consolidation – Privacy and Data Security
A Blueprint for Efficient SRRs: Mastering Your Subject Rights Workflow
Weathering the 2025 Whirlwind: How to Keep Calm & Carry On
The Privacy Insider Podcast Episode 10: 2025 Privacy Predictions: Hold My Beer, 2024
2025 Privacy Law Preview: Be Prepared
The American Privacy Right Act (APRA) explained
Will the U.S. Have a GDPR? With Rachael Ormiston of Osano
[Webinar] Midyear Data Privacy Check-in: Trends & Key Updates
Decoding Privacy Laws: Insights for Small to Mid-Sized Businesses — Regulatory Oversight Podcast
Navigating State Privacy Laws
[Webinar] AI and Data Privacy: Minimizing Risk and Maximizing Opportunity
Embracing Data Privacy to Drive Business Growth: On Record PR
Working on the go has become a necessity for many, but it should never come at the expense of confidentiality. Julie Savarino explains....more
Employees traveling internationally on behalf of an organization must take steps to protect sensitive, confidential, or proprietary data carried on electronic devices. U.S. Customs and Border Protection (CBP) has broad...more
ComplexDiscovery Editor’s Note: Emotional bonds with AI are no longer speculative—they’re shaping user behavior and redefining the risks legal professionals must address. This thoughtful exploration of artificial intimacy...more
Ours is an age of identity fraud, data breaches, public registers, and political and media interest in the ownership of Australian real estate. Take a moment to consider the real estate-related data that can be readily...more
Right now, we are all taking stock of the many important issues and challenges we saw crop up for clients last year, trying to predict what they will face in the coming year, and strategizing about how we can help....more
Wearable technologies are becoming increasingly common in the workplace, but a new guidance document from the Equal Employment Opportunity Commission (EEOC) has made it clear that employers need to tread carefully. From smart...more
On November 12, 2024, the Quebec Court of Appeal (QCA) rendered a significant decision in Autorité des marchés financiers c. Ordre des comptables professionnels agréés du Québec (available in French only) relating to section...more
Looking forward to the 2025 prediction season, a survey of the emerging AI-powered drug discovery landscape has been making the rounds—and with good reason. The survey, summarized by Stanford’s Chris Bradbury, is likely the...more
Join us as we spotlight select chapters of Venable’s popular Advertising Law Tool Kit, which helps marketing teams navigate the legal risk of campaigns and promotions....more
In a closely watched decision, the highest court in Massachusetts has rejected the theory that third-party website tracking technology violates G. L. c. 272, § 99, the Massachusetts Wiretap Act....more
As generative AI continues to be a hot topic in board rooms and an unavoidable reality on the front lines of business, leaders must make informed decisions when choosing AI vendors. The integration of AI into your operations...more
On July 19, Change Healthcare Ince. filed a breach report with HHS Office for Civil Rights (OCR) concerning its mammoth ransomware attack and breach. The organization’s breach report to OCR identifies just 500 individuals as...more
Recently filed class action complaints allege that companies that utilize embedded trackers within emails, or “spy pixels” as the plaintiffs are calling them, violate Arizona law because they collect a “communication service...more
The integration of artificial intelligence (AI) has revolutionized various industries, offering efficiency, accuracy, and convenience. In the realm of estate planning and family offices, the integration of AI technologies has...more
Earlier this week, the Biden-Harris Administration, through the Office for Civil Rights (OCR) announced a Final Rule aimed at protecting protected health information (PHI) related to lawfully provided reproductive health care...more
How do you protect trade secrets? You take reasonable efforts to maintain the secrecy of the information. As we have outlined in prior installments of this series, taking reasonable efforts to maintain secrecy is a key issue...more
Can privacy law and trade secret law coexist, or is compliance with both impossible? We are experiencing the fourth industrial revolution, driven by the rise in data and connectivity, analytics and artificial intelligence....more
The New York State Education Department (“NYSED”) released new guidance to support transgender and gender-expansive (“TGE”) K-12 students. This much anticipated update substantially expands previous guidelines issued eight...more
In the FTC’s first case focused on the privacy and security of genetic information, the FTC alleges that San Francisco-based Vitagene, Inc. – now known as 1Health.io – failed to live up to its promises and unfairly changed...more
For companies that conduct business in both the European Union and the United States, data transfers between the EU and the U.S. has long been a challenging process, primarily in light of the EU’s strict privacy regulation,...more
This Privacy Tip stands at the intersection of communication privacy, client confidentiality and email etiquette. If you BCC someone on an email, can any of the direct or CC-d recipients determine who were the BCC...more
Privacy Litigation Webinar Series Part 1 - Our Global Privacy & Cybersecurity team will be hosting a monthly webinar series on key issues and developments in privacy litigation. Confidentiality is a fundamental...more
Welcome to Wiley’s update on recent developments and what’s next in consumer protection at the Consumer Financial Protection Bureau (CFPB) and Federal Trade Commission (FTC). In this newsletter, we analyze recent regulatory...more
The SEC’s enforcement action with a leading seller of market data (App Annie Inc.) signals its concern with misleading data use representations. While the data at issue was not “personally identifiable” information, but...more
Cannabis businesses have cyber security and privacy risks. While the risks are varied, many arise from the businesses’ holding of highly sensitive consumer information or confidential data about business partners. Cannabis...more