Privacy

Class Action Suits Allege Violations of Illinois Biometric Information Privacy Act

By: Gwenn Barney

As punch cards are replaced with retina scanners, and keys with fingerprint identification, employers are facing more lawsuits related to the protection of employees’ biometric data.

Last week, an employee filed two separate class action lawsuits in Illinois against salad restaurant chain Sweetgreen and Philadelphia-based food services provider Aramark for violations of the Illinois Biometric Information Privacy Act (BIPA). The new lawsuits add to over 30 lawsuits already filed for violations of BIPA in the past three months.

Class Action Suits Allege Violations of Illinois Biometric Information Privacy Act Read More »

The FTC Provides Additional Guidelines on COPPA Compliance

On October 23, 2017, the FTC provided additional guidance on the COPPA Rule regarding the collection of audio voice recordings by organizations covered by the law. The FTC advised that the collection of an audio file from a child, even when such a file is being used solely as replacement for written words, falls within the first prong of the definition of collection. As a result, as soon as an operator obtains a recording, the operator has collected the recording for purposes of the COPPA Rule regardless of how long it maintains possession of the file. The FTC advised that it understood the value of using voice as a replacement for written words in performing search and other functions on internet-connected devices, especially for certain consumers such as children who have not yet learned to write. As such, the FTC advises that it will not take any enforcement action in certain circumstances where an operator collects an audio file from a child without parental consent. …

The FTC Provides Additional Guidelines on COPPA Compliance Read More »

Tech Study Reveals Media Players Susceptible To Hacking

A team of researchers at Check Point Software Technologies recently announced the disturbing results of a new study that identified media player subtitles as a new avenue of attack for hackers. Cyber hacks typically fall into two broad categories, either: (a) enticing the user to visit a malicious website; or (b) masking a malicious file that the user is conned into running on a device themselves. The latest vulnerability discovered by Check Point falls into the latter category, but is particularly dangerous due to the minimal amount of action required on the part of a user, and the general lack of awareness the public has about the vulnerability. …

Tech Study Reveals Media Players Susceptible To Hacking Read More »

SPY Car and Cyber AIR Acts: Regulating the Internet of Things

The continuing proliferation of internet-connected devices (the “Internet of Things”) has accelerated the availability of modern technological conveniences hand in hand with the erosion of cybersecurity and privacy. In October 2015, White and Williams released a client alert addressing the myriad privacy and security issues that the increased Internet of Things had already created, as well as explored new potential risks posed by such pervasive interconnectivity. In particular, the alert highlighted the potential physical dangers posed by the hacking of internet-connected cars. Such vehicles can be accessed by third parties to not only control accessory components, such as windshield wipers and air conditioning, but a driver’s very ability to operate the vehicle itself.

SPY Car and Cyber AIR Acts: Regulating the Internet of Things Read More »