Social Media Advertising Tools And User Consent: What Are The Requirements?
Share on facebook Share on twitter Share on linkedin Perhaps you’ve seen them, those television and radio ads that talk about the “creepy” nature of some adverting on the Internet that follows consumers across their social media. According to Pew Research, most Americans believe their online activities are being tracked and monitored. The fact is, […]
Does My Business Need A “Button” To Comply With The CCPA’s Do Not Sell Rule?
Share on facebook Share on twitter Share on linkedin The California Consumer Privacy Act (“CCPA”) was enacted in early 2018 and went into effect in 2020. Among many concerns about the ability of small businesses to comply with obligations imposed by the CCPA is the requirement that a company allow Californians to access the information […]
Privacy Law – How Do You Verify the Identity of a Data Requestor?
Share on facebook Share on twitter Share on linkedin The California Consumer Privacy Act (“CCPA”) was enacted in early 2018 and will go into effect in 2020. Among many concerns about the ability of small businesses to comply with obligations imposed by the CCPA is the requirement that a company allow Californians to access the […]
Illinois Amends the Freedom From Location Surveillance Act
Share on facebook Share on twitter Share on linkedin The latest amendments to the Act provide even more privacy positive aspects. The definition of “electronic device” has been clarified to include any device that enables access to, or use of an electronic communication service that provides the ability to send or receive wire or electronic […]
Recent Court Decisions Provide Some Clarity in Ever-changing Techlaw Landscape
Share on facebook Share on twitter Share on linkedin As every CIO knows, today all business is digital business. From the corner mom and pop bodega using Square to process credit cards up to Cisco Systems global network of devices supporting Zetabytes of data over an increasing number of devices. What began as largely static […]
ICYMI – Cyber Security & Forensics “Data At Risk” 2017
Share on facebook Share on twitter Share on linkedin In case you missed this year’s ForenSecure Conference on Cyber Security and Data Forensics, there is a link below to my presentation. To give you an idea how fast the law is changing in these areas, you need look no further than the state of New […]
Cybersecurity is one of the top risks organizations must manage in 2017
Share on facebook Share on twitter Share on linkedin This article first appeared in THE LEGAL SIDE OF TECH on CIO.com here. Recent high-profile data breaches highlight the challenges in understanding how laws apply to a wide variety of information management scenarios and a host of other regulatory, compliance and legal issues. Cybersecurity and privacy […]
Do we need a Federal Right of Publicity Statute?
Share on facebook Share on twitter Share on linkedin From film to fashion, creative industries are taking steps to protect and promote original work. Designers and manufacturers need to know what steps they can take to protect their designs, their businesses, and their profits. As more interior designers develop signature styles and product lines, protecting […]
Privacy & Security Issues In Smart Home and IoT Devices
Share on facebook Share on twitter Share on linkedin Comprised of connected devices such as thermostats, automobiles, electricity, televisions, fitness trackers, security/baby-monitoring cameras, medical devices, cell phones and tablets, IoT adoption is penetrating some of the world’s most regulated industries such as healthcare, energy, government, financial services, and retail. The potential size of the IoT […]
Getting Smart about Smart-Device #Privacy ISBA
Share on facebook Share on twitter Share on linkedin My latest Article in the Illinois Bar Journal entitled – Getting Smart about Smart-Device #Privacy, discusses wide range of legal and regulatory issues around privacy and security affecting the “Internet of Things.” This overview identifies risks and suggests some best practices for addressing privacy and security issues […]