This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
For global organizations and international law firms, conducting internal investigations that involve U.S. privacy compliance depends on navigating a maze of federal statutes, state-level laws, and industry-specific regulations. Instead, U.S. Data Retention: A Double-Edged Sword U.S. and international standards.
Amidst a world where cyber threats are becoming very advanced and prevalent, it is now imperative to uphold robust compliance to security frameworks, as well as sufficient cybersecurity measures , to secure data. Further, it will encompass several data compliance standards, besides being at the same time debating certain challenges.
For example, employment lawyers need to stay up to date on regulatory changes and laws related to labor law. At the same time, the practice of law is changing rapidly. Privacy and cybersecurity Privacy and cybersecurity laws are complex and vary between states (e.g., CCPA laws ).
Learn how big tech has changed the legal industry Free Guide The Small Firm’s Guide to Big Tech While any change in how you operate your law office can feel overwhelming, there’s never been a better time to start migrating your office structures online. Two primary laws govern the use of eSignatures in the U.S.:
HIPAA : The Health Insurance Portability and Accountability Act (HIPAA) is a federallaw that requires healthcare providers and “ business associates ” to protect protected health information (PHI) from inadvertent disclosure. Check out our blog post on understanding HIPAA compliance for more information.
Although states continue to pass comprehensive privacy laws in 2023, Washington’s My Health My Data Act (“MHMDA”) deserves closer attention due to its breadth as well as its novel—and potentially onerous—provisions. What Are the Key Substantive Obligations? What Are the Risks?
Although states continue to pass comprehensive privacy laws in 2023, Washington’s My Health My Data Act (“MHMDA”) deserves closer attention due to its breadth as well as its novel—and potentially onerous—provisions. What Are the Key Substantive Obligations? What Are the Risks?
Marketing: In the retail context, facial recognition or “facial detection” technologies can scan shoppers for features such as age, gender, and mood—then deliver tailored advertisements in real time. Particularly scrutinized is the use of “real-time” facial recognition to scan crowds in public places, such as marches and protests.
ESIGN, UETA, and laws governing e-signatures in the US In the US, there are two primary laws governing electronic signatures: The Electronic Signature in Global and National Commerce (ESIGN) Act is a federallaw that serves to create a US standard for electronic signatures. The ESIGN Act applies nationwide. Less paper.
Investigators demonstrated vulnerabilities by purchasing digital advertising data from brokers to track U.S. company and its foreign subsidiaries and transactions required by federallaw or international agreements. To underscore these risks, DOJ cited real-world cases of unregulated access to sensitive data. DOJ expects U.S.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content