Using the Safe Harbor Method to De-Identify Data
Last week, we introduced the topic of de-identified data, its exceptions under various comprehensive privacy laws, and two methods of how to properly de-identify data. In this week’s edition, we …
Last week, we introduced the topic of de-identified data, its exceptions under various comprehensive privacy laws, and two methods of how to properly de-identify data. In this week’s edition, we …
In previous blogs, we have discussed various privacy and AI laws that create restrictions on the processing of personal information. Today, we discuss de-identified data, which is generally exempt from …
This week, we are shifting our focus back to privacy law. Although our most recent blogs focused on A.I.-specific laws, which are still in their nascent stage, privacy laws actually …
For this week’s edition, we are taking a bit of a detour in this already turbulent new year to discuss a most recent development: U.S. Data Restrictions to “Countries of …
My blog last week was devoted to the importance of the retention schedule. This week I want to discuss various methods I have seen over the years for updating or …
I just attended the ABA Business Law Section annual conference in San Diego last week, and here are the three hottest topics I gleaned from various committee meetings and continuing education courses.