A federal appeals court found that law enforcement violated a Google user’s constitutional rights when it opened email attachments the platform flagged as child pornography through an automated system.
One Recipe for Success: Treat Private Data With the Same Priority Given to Privilege
But for all the coverage that privacy regulations are meant to provide, there is precious little guidance about how to protect private information, and there is very little legal precedent to guide our practices.
The recent Doe v. Purdue University case out of the Northern District of Indiana — in which the court sanctioned plaintiff for failing to preserve relevant images and videos from his Snapchat application — teaches that counsel must understand the retention and deletion features of Snapchat and other messaging apps and social media if they are to help their clients preserve relevant ESI.
This article gives historical context to the events that brought us to the current climate and provides guidance on how employers and employees can successfully navigate the ensuing complexities of job searching and hiring in the post-pandemic pandemonium.
Part One of a Two-Part Article
F. Paul Greene
The failure of NYPA to pass is not exceptionally noteworthy. What is noteworthy, however, is that it marks an escalation of data privacy protections and restrictions not seen in other major regulatory regimes, whether in the United States or abroad. And since most believe its failure to pass was due more to the end-of-session rush than its contents, don't be surprised if it pops up again in January 2022.
Rita W. Garry
In the past four months of 2021, the amount of state legislative activity around consumer data privacy laws has been frantic, by state legislatures standards. So much so, it is not easy to discern the cause for all this effort.
Companies are collecting and managing more data than ever, essentially in order to create value, thus in effect making every company a “data” company. But for data to provide value, organizations need to know where it is, who has access to it, how it’s managed, including its longevity value, and how it needs to be secured and protected.
Christine K. Au-Yeung
NFTs have been all the rage lately. So what exactly are they?
This article looks at privacy discussions, focusing on what in the circumstances discussed renders the IT data private and whether the criteria relied upon when courts and others in the discussion determine that the data is or is not private is truly determinative, as well as properly understood.
For many tech companies today, their products and business model require the collection and storage of data. At the same time, a failure to build adequate data protection technology, processes, and operations will continuously generate “privacy debt” for the business. The accumulation of this “privacy debt” can eventually turn away customers, attract regulatory penalties, and create an existential risk for the company.