Latest Posts
Privacy Tip #479 – Federal Judge Says ICE Prohibited from Using IRS Data for Enforcement
On February 5, 2026, a Massachusetts federal judge issued an order staying information-sharing between the IRS and ICE, as well…
Novelty is a core requirement for any invention to be patentable. Put simply, your invention generally cannot have been publicly…
CIPA Demand Letters Are Here to Stay; Reducing Risk from Chat, Session Replay, and Analytics
Until California’s legislature provides clearer guardrails, companies should expect continued class action activity under the California Invasion of Privacy Act…
In January, the General Services Administration’s (GSA) Office of the Chief Information Security Officer issued a new procedural guide, CIO-IT…
Tracking After Rejection? ATP Tour Complaint Highlights Risks of Misaligned Cookie Controls
California resident Nathaniel Bee filed a lawsuit this week alleging that the ATP Tour’s website used third-party tracking technology that…
Security researchers at Huntress Labs have identified a vulnerability in SolarWinds’s Web Help Desk that threat actors are exploiting to…
Privacy Tip #478 – Intrigued With Using AI to Help with Your Tax Return? Please Think Again
It’s that time of the year when W2s and 1099s pile up in preparation for that dreaded tax return filing…
On January 27, 2026, the Federal Trade Commission (FTC) signaled the agency’s reduced appetite for regulating artificial intelligence. At the…
In a strongly worded order, Judge Julie A. Robinson of the U.S. District Court for the District of Kansas publicly…
New Trend under Florida’s Wiretap Statute: Websites with Tracking Technology Beware
Florida website tracking litigation is gaining momentum this year, with plaintiffs increasingly invoking the Florida Security of Communications Act (FSCA)…
New Investigative Sweep Under the CCPA: Individualized Pricing as a Privacy Problem
States are weighing in on whether grocery stores, hotel chains, and retailers should be using personal consumer information such as…
Security professionals rely on the implementation of multifactor authentication (MFA) to defend against phishing attacks and intrusions. Unfortunately, we can’t…
