• Sherica Celine
    Sherica Celine
    • over 3 years ago
    • Practical Guidance Journal
    • pa

    Employer's Guide to Employee Vaccination Data Privacy and Protection

    By: Karen Mandelbaum , RyAnn M. Hooper & Susan Gross Sholinsky EPSTEIN BECKER GREEN, P.C. This article will explore the privacy concerns created when implementing a mandatory vaccine policy and collecting vaccination status information from employees...
  • Sherica Celine
    Sherica Celine
    • 7 months ago
    • Practical Guidance Journal
    • pa

    Chevron Deference Reversal: FDA Rulemaking and Legal Challenges After Loper Bright

    By: Chad A. Landmon and Suzanne E. Bassett , POLSINELLI PC THIS ARTICLE PROVIDES GUIDANCE ON THE IMPACT of the U.S. Supreme Court’s recent decisions in Loper Bright 1 and Corner Post 2 on decision-making by the U.S. Food and Drug Administration...
  • Sherica Celine
    Sherica Celine
    • over 1 year ago
    • Practical Guidance Journal
    • pa

    Generative Artificial Intelligence, Data Minimization, and Today’s Gold Rush

    By: D. Reed Freeman Jr., ARENTFOX SCHIFF LLP THIS ARTICLE DISCUSSES THE PRINCIPLE OF DATA MINIMIZATION in the context of commercial applications of generative artificial intelligence (GenAI) technology and tools. In the United States, the principle...
  • Vinayak Kohli
    Vinayak Kohli
    • over 6 years ago
    • Practical Guidance Journal
    • pa

    Special Coverage: Broader Implications of California's Sweeping Online Data Privacy Statute

    Broader Implications of CALIFORNIA’S SWEEPING ONLINE DATA PRIVACY STATUTE THE SIGNING OF A WIDE-RANGING DATA PRIVACY LAW in California should serve as a signal to all businesses that collect personal information about state residents to review...
  • Vinayak Kohli
    Vinayak Kohli
    • over 5 years ago
    • Practical Guidance Journal
    • pa

    Minimizing Your Company’s Exposure to a Ransomware Attack

    By: Sunil Shenoi , Erica Williams , Brian Kavanaugh , Gianni Cutri , and Lauren Casazza , Kirkland & Ellis LLP This article provides companies with key issues to consider before, during, and after a ransomware attack. Recently, there have been a...
<>