The Privacy Insider Podcast Episode 11: Signal and Noise: The New Administration, Privacy, and Our Digital Rights with Cindy Cohn of Electronic Frontier Foundation
Law Brief®: Rich Schoenstein and Joshua Ritter Discuss Cameras in the Courts
Webinar Recording – Assessing the Surge in Wiretap Litigation
1984 in the Workplace — Is Employee Surveillance Trending?
Workers' Compensation Academy: 2020: A Unique Year in Many Ways Including Changes in New Jersey Workers’ Compensation
Workers' Compensation Academy: The Smoking Gun: Importance of Investigation in Insurance & Workers’ Compensation
I’ll be watching you: The ins and outs of employee monitoring
Is Edward Snowden a Whistleblower?
Le 20 mai 2025, la Commission d’accès à l’information du Québec (la « CAI ») a rendu une décision concernant l’utilisation par une société de livraison, 13859380 Canada Inc. (faisant affaire sous le nom Crane Supply) (la «...more
On May 20, 2025, the Commission d’accès à l’information du Québec (CAI) issued a decision regarding the use of in-vehicle video surveillance technology by a delivery company, 13859380 Canada Inc., dba Crane Supply (the...more
Canadian Institute’s Law of Policing Conference, Eastern Edition, returns to Mississauga with the latest updates on how policing is progressing in Canada. Join this conference for two days of meaningful conversations and...more
Case law recognizes that constant and continuous video surveillance of employees may constitute an unreasonable working condition, and thus violate section 46 of Québec’s Charter of Human Rights and Freedoms (“Charter”), when...more
This week’s Short-Term Rental Update features a number of interesting topics, including these highlights...more
Privacy and data security professionals worldwide should circle September 1 on their calendars, as it’s the day Russia’s new data localization law goes into effect – and possibly generates major waves far beyond Russian...more
The Commerce Department’s export control agency, BIS, has proposed a new rule to control exports of equipment and software designed or modified to perform network intrusion and internet protocol communications surveillance. ...more