This Audio Course is your complete audio-first companion to the CIPP/US certification. Across structured episodes, it breaks down U.S. privacy law from federal and state frameworks to workplace rules and international overlaps, all aligned with the official IAPP Body of Knowledge. You’ll get guided walkthroughs of statutes, enforcement themes, case law, and key regulatory agencies, plus study strategies, glossary deep dives, and exam skills to build lasting confidence. Designed for on-the-go ...
…
continue reading
Data Subject Rights Podcasts
What matters most right now in Commercial Real Estate. Business leaders join economic, industry and subject matter experts to share their distinct views and latest thinking. The Weekly Take is hosted by Spencer Levy, CBRE’s Senior Economic Advisor and Global Client Strategist. More at cbre.com/TheWeeklyTake
…
continue reading
IT is about more than systems and software – it’s about people, progress, and purpose. In this podcast, our CEO, Julie Bishop, speaks to IT leaders, digital changemakers, and purpose-driven organisations to uncover how technology is being used for good – from transforming teams to tackling social challenges. Julie loves chatting about her favourite subject – people and tech – especially with those who are doing IT differently.
…
continue reading
This podcast is for ocean entrepreneurs and innovators who want to grow and succeed in the blue economy. Through interviews with industry leaders, founders, and subject matter experts, I will share their stories, unpack their most important lessons, and extract actionable insights and best practices.
…
continue reading
Running a business is hard. You get stuck. The good news is, you’re resilient, resourceful, and in the right place, Join Expert EOS Implementer® and business coach Sue Hawkes as she talks to entrepreneurs just like you about the challenges they're facing. Plus, she chats with experts about their takes on those challenges and how each of them connects back to the six key components of a successful business: vision, people, data, issues, process, and traction. Learn from the real-world experie ...
…
continue reading
Hi, I’m Kelly Oliver Dougall. I’m a counsellor, podcast host, and an advocate for women’s sex-based rights and free speech. I work with women who’ve been cancelled, bullied, or harassed - often in their workplaces or communities - helping them rebuild confidence so they can move forward again. Alongside my counselling work, I also run a home care business, so I understand the realities of juggling care, responsibility, and trying to stay true to your values. On my podcast, I speak with women ...
…
continue reading
It's been said before. What has been will be again, what has been done will be done again; there is nothing new under the sun ... but it sure *seems* like this is new, right? Electric cars, internet of things, artificial intelligence — it all feels like uncharted territory ... but we're here to prove otherwise, with help from subject matter experts, tech enthusiasts, and a few of the friends we've made along the way. And, no matter what the idea of the day is, remember: it's been said before ...
…
continue reading
Right now, millions of people are tuning into podcasts to be entertained, educated and inspired by creators just like you. But committing to a podcast is tough. The number one way podcasts grow is word of mouth, so how do you create a show worth talking about? How else can you reach bigger audiences? And how do you eventually convert that audience into revenue? This is the Subject Matter podcast, a show for aspiring creators wanting to build with audio. Hosted by Ben Bradbury, every episode ...
…
continue reading
Are you a leader in Higher Education? Or are you working in HE Marketing? Perhaps you work in academia and want to know how to boost the success of your subject area. Have you ever wondered what it takes to get your whole university to get behind the concept of student recruitment and growth? It’s all about creating a Culture of Enrolment. In this podcast series you’ll hear all of the secrets behind getting all colleagues (and all silos) behind the concept of Higher Education marketing and s ...
…
continue reading
In an increasingly digital world that we live in, building secure software is important for us all. Just as personal safety and security are fundamental needs, we at the Purple Book Community believe digital security is a fundamental need as well. Welcome to The Purple Book Podcast. This podcast is part of the Purple Book Community, a community of some of the world’s leading security leaders. Our vision is to build a purpose driven, trusted, and safe community that equips people with the exp ...
…
continue reading
Go Un-Pro with Dr. Brent W. Laartz, MD FIDSA: Living an Unprocessed Life for Longevity and Healthspan Have you ever known that something is SO good for you that you just can't wait, but life gets in front of you and prevents you from doing it? The inaction and procrastination could occur for a variety of reasons, and we will delve into my motivations and affirmations of a healthy life from this day forward. I am starting this series of videos and articles so that I can be accountable to myse ...
…
continue reading
Learn more about the market and stock analysis through CAEE™. CAEE™ is in a unique analytical framework designed to help market participants, researchers, and learners better understand Index performance and long term valuation trends. Our publications and podcast episodes feature insights derived from CAEE™ , which are for use in our educational and analytical services. Email [email protected] to request a CAEE™ based performance report on the magnificent 7 index or to request a ...
…
continue reading

1
Episode 79 — Data Subject Rights: Access, Deletion, Portability, and Consent
22:14
22:14
Play later
Play later
Lists
Like
Liked
22:14State laws grant individuals a suite of rights over their personal data. This episode explains the rights to access, correct, delete, and port data, as well as opt-out and consent requirements. We’ll highlight how these rights compare across major state frameworks like California’s CCPA/CPRA, Virginia’s CDPA, and Colorado’s Privacy Act. We’ll also …
…
continue reading

1
The future of women's rights is in our hands - Kelly talks to Kellie-Jay Keen
1:07:32
1:07:32
Play later
Play later
Lists
Like
Liked
1:07:32Send us a text I am very excited to welcome @KellieJayKeen onto my channel, a year on from starting my podcast. From attending my first Let Women Speak event in January 2023 to running as a candidate in the General election for Party of Women, it was quite wonderful to welcome KJK - the woman who made all of that happen. Join Kellie-Jay and Kelly O…
…
continue reading

1
Why Green IT Grew Up: Data, Duty and Doing the Right Thing with Phil Wharton
30:23
30:23
Play later
Play later
Lists
Like
Liked
30:23“Green IT” used to mean switching off screensavers or recycling old laptops. But times have changed. In this episode of the IT Naturally Podcast, Julie Bishop speaks to Phil Wharton- Interim Technology Leader, Board Adviser and Independent Consultant who has held senior roles at Google, Jaguar Land Rover, Rolls-Royce, PA Consulting, Novo Nordisk an…
…
continue reading

1
#34: Jay Dignan – Cracking the Seaweed Code: How Fucoidan Unlocks a Profitable Business Model
1:17:11
1:17:11
Play later
Play later
Lists
Like
Liked
1:17:11Send us a text As the founder of BioMara, a marine biotech startup based in Scotland, Jay Dignan is dedicated to transforming regenerative seaweed into functional and healthy B2B ingredients for the food and wellness industries. His professional journey began in New Zealand and includes a diverse range of experiences, from deep-sea salvage and work…
…
continue reading

1
Right Here, Right Now: Reinventing the American Mall
37:14
37:14
Play later
Play later
Lists
Like
Liked
37:14CBL Properties’ Stephen Lebovitz and CBRE’s Rich Frolik explain how malls are being transformed into high-performing, mixed-use assets. From casinos and hotels to pickleball and movie theaters, malls are evolving to meet modern demand. Key takeaways on the evolution of malls: · Malls are transitioning into multi-use destinations, integrating entert…
…
continue reading

1
I was born totally blind - Kelly talks to Michaela Cox. Disability needs more focus
1:01:44
1:01:44
Play later
Play later
Lists
Like
Liked
1:01:44Send us a text In this conversation, Michaela Cox shares her profound journey through life, marked by personal challenges including legal blindness, a divorce, and the unexpected loss of her husband. She discusses the complexities of navigating disability, the importance of self-advocacy, and the impact of grief on her life. Michaela emphasizes the…
…
continue reading

1
They see women as holes with a pulse - Kelly talks to Jenny Kimmel
55:56
55:56
Play later
Play later
Lists
Like
Liked
55:56Send us a text In this conversation, Kelly Oliver Dougall speaks with Jennifer Kimmel, a trans widow, who shares her personal experiences and insights regarding the complexities of gender identity, abuse, and the societal implications surrounding these issues. Jennifer discusses the emotional and legal challenges she faced, the impact on her childr…
…
continue reading

1
The Long Run: What’s Driving Net Lease Investment
34:46
34:46
Play later
Play later
Lists
Like
Liked
34:46Net lease assets are attracting more institutional capital. New Mountain Capital’s Teddy Kaplan and CBRE’s Will Pike explore why this resilient, tax-efficient investment strategy is gaining favor. Attractive in volatile markets: Positioned as a hybrid asset class—part real estate and part structured finance, net lease investments offer cash flow ba…
…
continue reading

1
Episode 97 — Cross-Domain Comparison: Federal, State, and International Overlaps
26:50
26:50
Play later
Play later
Lists
Like
Liked
26:50The final episode ties everything together by comparing U.S. federal privacy laws, state-level frameworks, and international regimes like the GDPR. We’ll highlight how similar principles—such as data subject rights, accountability, and security safeguards—take different forms across jurisdictions. We’ll also explore where overlaps create synergies …
…
continue reading

1
Episode 96 — Recent Changes: Pennsylvania SB 696 and Utah S.B. 127
28:22
28:22
Play later
Play later
Lists
Like
Liked
28:22State privacy laws continue to evolve. This episode reviews recent changes, such as Pennsylvania SB 696, which updated breach notification requirements, and Utah S.B. 127, which amended cybersecurity provisions. These examples show how states adapt their frameworks to address new threats and policy priorities. For exam purposes, understanding recen…
…
continue reading

1
Episode 95 — State Variations: Comparing Notification Timelines and Duties
21:52
21:52
Play later
Play later
Lists
Like
Liked
21:52Even within the common framework of breach notification, state differences matter. This episode compares notification timelines, which can range from “without unreasonable delay” to fixed deadlines like 30 or 45 days. We’ll also examine variations in whom to notify, from affected consumers to regulators and credit reporting agencies. Understanding …
…
continue reading

1
Episode 94 — Breach Notification: Definitions, Triggers, and Scope
22:25
22:25
Play later
Play later
Lists
Like
Liked
22:25State breach notification laws form one of the most uniform yet varied areas of privacy law. This episode reviews the common elements—definitions of personal information, what constitutes a breach, and when notification is required. We’ll also explore differences across states, such as timelines, thresholds, and required content of notices. We’ll a…
…
continue reading

1
Episode 93 — Enforcement Mechanics: Cure Periods and Penalties
22:32
22:32
Play later
Play later
Lists
Like
Liked
22:32Enforcement provisions determine how state privacy laws are applied in practice. This episode explains cure periods, which give businesses time to fix violations before penalties are imposed, and how these provisions differ across states. We’ll also examine penalties, remedies, and enforcement authority, often vested in state attorneys general or p…
…
continue reading

1
Episode 92 — Other State Acts: Emerging Comprehensive Privacy Laws
23:42
23:42
Play later
Play later
Lists
Like
Liked
23:42Beyond California, Virginia, and Colorado, many states are adopting or considering comprehensive privacy laws. This episode surveys these developments, highlighting features of statutes in states like Connecticut, Utah, and others. We’ll discuss how they generally follow the same model of applicability thresholds, consumer rights, and controller/pr…
…
continue reading

1
Episode 91 — Colorado Privacy Act: Rights, Duties, and Insurance Bias Provisions
24:35
24:35
Play later
Play later
Lists
Like
Liked
24:35Colorado’s Privacy Act builds on the momentum from California and Virginia, offering a comprehensive framework with unique twists. This episode reviews its applicability standards, consumer rights, and controller/processor obligations, including data protection assessments. We’ll also cover Colorado’s focus on fairness in insurance, with rules addr…
…
continue reading

1
Episode 90 — Virginia CDPA: Consumer Data Protection Act Essentials
23:12
23:12
Play later
Play later
Lists
Like
Liked
23:12Virginia’s Consumer Data Protection Act (CDPA) established one of the first comprehensive state privacy frameworks outside California. This episode reviews its applicability thresholds, consumer rights, and obligations for controllers and processors. We’ll also discuss how the CDPA balances business flexibility with consumer protections. We’ll high…
…
continue reading

1
Episode 89 — California Delete Act: Data Broker Registration and Rights
22:19
22:19
Play later
Play later
Lists
Like
Liked
22:19The California Delete Act introduces obligations for data brokers, requiring them to register and enabling consumers to request deletion of their data from all registered brokers at once. This episode explores the mechanics of the Act, its impact on the data broker industry, and how it expands consumer control. We’ll also review enforcement provisi…
…
continue reading

1
Episode 88 — California AADC: Age-Appropriate Design Code Protections
25:28
25:28
Play later
Play later
Lists
Like
Liked
25:28Children’s privacy receives special attention in California’s Age-Appropriate Design Code Act (AADC). This episode explains its requirements for online services likely to be accessed by minors, including risk assessments, high privacy default settings, and restrictions on profiling. The law reflects growing concern about children’s digital wellbein…
…
continue reading

1
Episode 87 — California CCPA/CPRA: Comprehensive Consumer Privacy Framework
27:13
27:13
Play later
Play later
Lists
Like
Liked
27:13California remains the leader in state privacy law. This episode reviews the California Consumer Privacy Act (CCPA) and its amendment through the California Privacy Rights Act (CPRA). We’ll explore applicability thresholds, data subject rights, notice obligations, and enforcement by the California Privacy Protection Agency. We’ll also highlight how…
…
continue reading

1
Episode 86 — AI Bias and ADM: NAIC AIS Guidelines, NYC AEDT, and State Rules
26:43
26:43
Play later
Play later
Lists
Like
Liked
26:43Automated decision-making (ADM) and artificial intelligence raise fairness and discrimination concerns. This episode introduces the NAIC Artificial Intelligence Governance Guidelines, New York City’s Automated Employment Decision Tools (AEDT) law, and state-level rules in California and Colorado. We’ll examine requirements for transparency, testing…
…
continue reading

1
Episode 85 — Biometric Privacy: IL BIPA, WA, TX, and Related Statutes
28:14
28:14
Play later
Play later
Lists
Like
Liked
28:14Biometric privacy laws impose strict requirements on collecting and using data such as fingerprints, facial recognition, and iris scans. This episode covers the Illinois Biometric Information Privacy Act (BIPA), which requires consent, disclosure, and safeguards, as well as similar statutes in Washington and Texas. We’ll also review the growing num…
…
continue reading

1
Episode 84 — Cookies and Tracking: Online Privacy Regulations
27:24
27:24
Play later
Play later
Lists
Like
Liked
27:24State laws increasingly regulate cookies, pixels, and online tracking. This episode explains how transparency, consent, and opt-out obligations apply to digital advertising technologies. We’ll discuss requirements for cookie banners, preference signals, and global opt-out mechanisms. We’ll also highlight enforcement actions where regulators targete…
…
continue reading

1
Episode 83 — Health Data Rules: WA MHMD, NV Health Data Act, and IL GIPA
25:57
25:57
Play later
Play later
Lists
Like
Liked
25:57Beyond HIPAA, states have introduced new health data privacy statutes. This episode explores Washington’s My Health My Data Act (MHMD), Nevada’s Consumer Health Data Privacy Act, and Illinois’ Genetic Information Privacy Act (GIPA). We’ll review how these laws define consumer health data, impose consent requirements, and establish rights for deleti…
…
continue reading

1
Episode 82 — State Security Requirements: Common Controls Across Jurisdictions
22:06
22:06
Play later
Play later
Lists
Like
Liked
22:06Most state privacy laws include explicit security requirements. This episode reviews common obligations such as implementing reasonable safeguards, risk-based controls, encryption, and access restrictions. While states vary in language, the underlying expectation is that businesses adopt practices proportional to the sensitivity of data. We’ll also…
…
continue reading

1
Episode 81 — Data Protection Agreements: Contracts and Assessments
21:33
21:33
Play later
Play later
Lists
Like
Liked
21:33Contracts are central to ensuring compliance with state privacy laws. This episode explains how data protection agreements define the obligations between controllers and processors, including rules for data use, security, subcontracting, and breach notification. We’ll also review assessment requirements, where organizations must conduct and documen…
…
continue reading

1
Episode 80 — Privacy Notices: Transparency and Consumer Disclosures
21:41
21:41
Play later
Play later
Lists
Like
Liked
21:41Transparency is a cornerstone of state privacy laws. This episode covers the requirements for privacy notices, including disclosures about data collection, use, sharing, and consumer rights. We’ll examine layered notices, just-in-time disclosures, and special statements for sensitive data or financial incentives. We’ll also highlight enforcement tr…
…
continue reading

1
Episode 78 — Applicability Tests: Resident Thresholds, Revenue, and Exemptions
21:40
21:40
Play later
Play later
Lists
Like
Liked
21:40Comprehensive state privacy laws often hinge on applicability thresholds. This episode explores the criteria that determine whether a business must comply, such as number of state residents, annual revenue, or percentage of revenue from selling personal information. We’ll also cover common exemptions, including nonprofit entities, small businesses,…
…
continue reading

1
Episode 77 — State Authority: Attorneys General and CPPA Oversight
22:59
22:59
Play later
Play later
Lists
Like
Liked
22:59State enforcement has become increasingly influential in privacy regulation. This episode examines the role of state attorneys general, who bring actions under both state privacy laws and general consumer protection statutes. We’ll also focus on the California Privacy Protection Agency, which has broad authority under the CCPA and CPRA to issue reg…
…
continue reading

1
Episode 76 — Domain V Overview: Role of States in the U.S. Privacy Framework
23:18
23:18
Play later
Play later
Lists
Like
Liked
23:18Domain V introduces state privacy laws, which increasingly shape the U.S. privacy landscape. This episode provides an overview of how state authority interacts with federal law, highlighting the roles of state attorneys general, legislatures, and agencies like the California Privacy Protection Agency. We’ll also discuss how states serve as “laborat…
…
continue reading

1
Episode 75 — Post-Employment: Records, References, and Retention Duties
23:39
23:39
Play later
Play later
Lists
Like
Liked
23:39Privacy obligations continue even after employment ends. This episode reviews how employers manage personnel records after termination, including requirements for retention and eventual disposal. We’ll also cover privacy issues in providing references, balancing truthfulness with obligations to protect sensitive information. We’ll discuss how state…
…
continue reading

1
Episode 74 — ECPA at Work: Employer Obligations and Exceptions
23:14
23:14
Play later
Play later
Lists
Like
Liked
23:14The Electronic Communications Privacy Act (ECPA) plays a major role in regulating workplace privacy. This episode explains how the Act governs the interception and access of electronic communications, including email and phone calls, in the employment context. We’ll cover key exceptions that permit monitoring, such as the consent of at least one pa…
…
continue reading

1
Episode 73 — Internal Investigations: Misconduct, Documentation, and Handling
23:44
23:44
Play later
Play later
Lists
Like
Liked
23:44Organizations must often conduct internal investigations into employee misconduct, which involves significant privacy considerations. This episode explores how investigations collect and handle personal information, including interviews, system logs, and third-party services. We’ll discuss the importance of documenting evidence while respecting the…
…
continue reading

1
Episode 72 — Biometrics and Location: LBS, Wearables, and Wellness Programs
23:35
23:35
Play later
Play later
Lists
Like
Liked
23:35Biometric data and location-based services present unique privacy challenges in the workplace. This episode reviews how employers use tools like fingerprint scanners, facial recognition, GPS tracking, and wearable devices to monitor attendance, productivity, and health. We’ll cover the privacy risks, consent requirements, and the patchwork of state…
…
continue reading

1
Episode 71 — Employee Monitoring: Computers, Email, Phone, and Video
23:52
23:52
Play later
Play later
Lists
Like
Liked
23:52Employers often monitor employees’ use of technology and communications systems, raising important privacy issues. This episode examines the scope of monitoring activities, including computer usage, email systems, telephone records, and workplace video surveillance. We’ll explain how notice and consent play central roles in shaping the legality of …
…
continue reading

1
Episode 70 — Social Media Monitoring: Policies and Union Considerations
22:55
22:55
Play later
Play later
Lists
Like
Liked
22:55Employers increasingly monitor social media use, both during hiring and employment. This episode explores the privacy risks, including potential discrimination, reputational harm, and conflicts with labor rights. We’ll examine how the National Labor Relations Board protects “concerted activity” on social platforms, limiting how employers can respon…
…
continue reading

1
Episode 69 — Background Screening: Psychological Tests, Polygraphs, and Drug Testing
23:07
23:07
Play later
Play later
Lists
Like
Liked
23:07Employers often rely on background screening to evaluate candidates, but privacy laws set clear limits. This episode examines psychological and integrity tests, restrictions on polygraph testing under the Employee Polygraph Protection Act, and the privacy considerations in drug and alcohol testing. We’ll also discuss how the Fair Credit Reporting A…
…
continue reading

1
Episode 68 — Pre-Employment Tools: AI Hiring and Bias Mitigation
23:52
23:52
Play later
Play later
Lists
Like
Liked
23:52Employers increasingly use AI-driven tools for hiring, but these technologies raise privacy and fairness concerns. This episode explains how automated decision-making tools are regulated, including requirements for transparency, bias audits, and applicant rights. We’ll also explore how these tools intersect with anti-discrimination laws and state A…
…
continue reading

1
Episode 67 — Federal Agencies: FTC, DOL, EEOC, NLRB, and OSHA Roles
24:38
24:38
Play later
Play later
Lists
Like
Liked
24:38Multiple federal agencies shape employment privacy. This episode covers the Federal Trade Commission’s oversight of data security promises, the Department of Labor’s authority over wage and hour records, the Equal Employment Opportunity Commission’s enforcement of anti-discrimination laws, the National Labor Relations Board’s protection of concerte…
…
continue reading

1
Episode 66 — Workplace Privacy Concepts: Notice, Expectation, and Anti-Discrimination
25:14
25:14
Play later
Play later
Lists
Like
Liked
25:14Workplace privacy is grounded in concepts of notice, reasonable expectation of privacy, and nondiscrimination. This episode examines how employers must provide clear notice of monitoring practices, and how courts evaluate whether employees reasonably expected privacy in various contexts. Anti-discrimination laws add another layer of protection, pre…
…
continue reading

1
Episode 65 — Domain IV Overview: Employment Privacy from Hiring to Termination
26:24
26:24
Play later
Play later
Lists
Like
Liked
26:24Domain IV addresses privacy issues throughout the employment lifecycle. This episode provides an overview of pre-employment screening, workplace monitoring, and post-employment records retention. We’ll highlight the key statutes and agencies that regulate employment privacy, including the Civil Rights Act, the Americans with Disabilities Act, and t…
…
continue reading

1
Episode 64 — E-Discovery: Managing Personal Data in Civil Litigation
26:12
26:12
Play later
Play later
Lists
Like
Liked
26:12Civil litigation often requires the disclosure of large volumes of data, raising significant privacy concerns. This episode explains the role of electronic discovery (e-discovery), including how personal information is identified, reviewed, and produced during legal proceedings. We’ll cover how protective orders, redaction, and anonymization techni…
…
continue reading

1
Episode 63 — Media Protections: Privacy Protection Act and Compelled Disclosure
23:21
23:21
Play later
Play later
Lists
Like
Liked
23:21Media and journalism face unique privacy issues when government seeks access to information. This episode covers the Privacy Protection Act of 1980, which restricts government searches and seizures of media materials. We’ll explore how this law protects journalists from compelled disclosure and balances press freedom with law enforcement needs. We’…
…
continue reading

1
Episode 62 — CISA: Cybersecurity Information Sharing and Liability Protections
26:37
26:37
Play later
Play later
Lists
Like
Liked
26:37The Cybersecurity Information Sharing Act (CISA) encourages private companies to share cyber threat information with the government. This episode explains how the Act provides liability protections for organizations that participate, while also imposing requirements to remove personal information where possible. We’ll explore how CISA fits into the…
…
continue reading

1
Episode 61 — USA Freedom Act: Reforms to Bulk Collection
26:23
26:23
Play later
Play later
Lists
Like
Liked
26:23This episode covers the USA Freedom Act of 2015, which curtailed some of the sweeping surveillance authorities established under the USA PATRIOT Act. We’ll review how the Act ended bulk collection of telephone metadata by the National Security Agency, replacing it with a more targeted system requiring judicial approval. The reforms reflected public…
…
continue reading

1
Episode 60 — USA PATRIOT Act: Expanded Authority for Security Investigations
25:29
25:29
Play later
Play later
Lists
Like
Liked
25:29Passed after September 11, the USA PATRIOT Act expanded government surveillance powers. This episode covers how the Act broadened authority for accessing communications, financial records, and other personal data in the name of counterterrorism. We’ll examine key provisions, including roving wiretaps and National Security Letters, and the privacy i…
…
continue reading

1
Episode 59 — National Security: FISA and Section 702 Surveillance Authorities
25:38
25:38
Play later
Play later
Lists
Like
Liked
25:38National security laws create unique privacy challenges. This episode introduces the Foreign Intelligence Surveillance Act (FISA) and its Amendments Act, particularly Section 702, which authorizes surveillance of foreign targets. We’ll explain how these authorities intersect with data from U.S. companies and why they raise global privacy concerns. …
…
continue reading

1
Episode 58 — Communications Access: ECPA, CALEA, and Lawful Intercepts
25:40
25:40
Play later
Play later
Lists
Like
Liked
25:40Access to communications is one of the most sensitive areas of privacy law. This episode explores the Electronic Communications Privacy Act (ECPA), which regulates wiretaps and stored communications, and the Communications Assistance for Law Enforcement Act (CALEA), which requires telecom providers to enable lawful intercepts. We’ll also highlight …
…
continue reading

1
Episode 57 — Financial Data Access: RFPA and BSA Requirements
26:46
26:46
Play later
Play later
Lists
Like
Liked
26:46Government access to financial data is governed by specific laws. This episode covers the Right to Financial Privacy Act (RFPA), which sets limits on government access to bank records, and the Bank Secrecy Act (BSA), which requires institutions to monitor and report suspicious activity. These laws illustrate the tension between privacy rights and g…
…
continue reading

1
Episode 56 — Domain III Overview: Privacy and Government Requests for Data
28:03
28:03
Play later
Play later
Lists
Like
Liked
28:03Domain III introduces the critical issue of government access to private-sector information. This episode provides an overview of how laws regulate subpoenas, warrants, and requests from law enforcement or intelligence agencies. We’ll highlight statutes like the Electronic Communications Privacy Act (ECPA), the Foreign Intelligence Surveillance Act…
…
continue reading

1
Episode 55 — Web Scraping: Data Ethics and Legal Risk Considerations
25:03
25:03
Play later
Play later
Lists
Like
Liked
25:03Web scraping raises both ethical and legal challenges. This episode explains how scraping can collect vast amounts of personal information, often without consumer knowledge. We’ll discuss relevant statutes, contract law through terms of service, and enforcement actions related to unauthorized scraping. We’ll also consider the risks organizations fa…
…
continue reading