How Do You Verify the Identity of a Data Requestor?
By David Adler
Commercial Banking, Collections, and Bankruptcy,
March 2020
Under the California Consumer Privacy Act, companies must allow Californians to access the information held about them, or, in some situations, request that the information that they provided to a company be deleted. By keeping data minimization objectives in mind and not over-thinking compliance obligations, verifying the identity of a data requestor may be straight-forward.
How Do You Verify the Identity of a Data Requestor?
By David Adler
Privacy and Information Security Law,
September 2019
Under the California Consumer Privacy Act, companies must allow Californians to access the information held about them, or, in some situations, request that the information that they provided to a company be deleted. By keeping data minimization objectives in mind and not over-thinking compliance obligations, verifying the identity of a data requestor may be straight-forward.
Privacy Law Specialist Certification
By Martin Whittaker
Privacy and Information Security Law,
April 2019
For almost 20 years the International Association of Privacy Professionals has been certifying the expertise of people who work in various professions that demand familiarity and judgment about privacy law and regulation
Rule of thumb
By Rhys Saunders
Privacy and Information Security Law,
April 2019
The Illinois Supreme Court clarified the burden of proof under state's strict biometric privacy law in Rosenbach v. SixFlags Entertainment Corp.
Take control: What every attorney should do to keep hackers at bay
By Ruth E. Schneider
Business Advice and Financial Planning,
April 2019
Although not every firm will be the subject of a multi-million dollar hacking heist, the risks and consequences of failing to secure client data are every bit as consequential to the reputation and future of the firm.
Take control: What every attorney should do to keep hackers at bay
By Ruth E. Schneider
Privacy and Information Security Law,
February 2019
Although not every firm will be the subject of a multi-million dollar hacking heist, the risks and consequences of failing to secure client data are every bit as consequential to the reputation and future of the firm.
Ten questions to ask clients about privacy
By David M. Adler
Privacy and Information Security Law,
December 2018
Ten questions to ask your clients who are concerned about whether they are meeting their privacy and information security obligations.
Email: Why can’t I keep my free account?
By Carl R. Draper
Employee Benefits,
April 2018
We have ethical obligations now to be competent at use of technology, and free e-mail has far fewer expectations of privacy and protection from the service provider than paid subscriptions.
Equifax data breach: Where are we now?
By Oscar Piña
Government Lawyers,
March 2018
With the introduction of House Bill 4095, Illinois seeks to join several states that prohibit credit reporting agencies from charging fees for placing credit freezes.
What family law practitioners need to know about cyberstalking
By Marie K. Sarantakis
Family Law,
May 2017
Today’s family law attorney must have a cursory understanding of the legal framework concerning privacy issues in order to adequately instruct their clients about actions for which they may be found civilly and/or criminally liable.
Hey, you—Stay out of the cloud
By Charles Hutchinson
Law Office Management and Economics, Standing Committee on,
September 2014
Are an attorney's files ever really secure in a cloud-based account?
Select a Different Subject