{"@context":"https:\/\/schema.org\/","@type":"CollectionPage","@id":"https:\/\/www.grossmcginley.com\/resources\/tag\/privacy-and-data-security\/#CollectionPage","headline":"Privacy and Data Security Tag","description":"","url":"https:\/\/www.grossmcginley.com\/resources\/tag\/privacy-and-data-security\/","hasPart":[{"@type":"BlogPosting","@id":"https:\/\/www.grossmcginley.com\/resources\/blog\/the-rise-of-data-privacy-laws\/","headline":"The Rise of Data Privacy Laws","url":"https:\/\/www.grossmcginley.com\/resources\/blog\/the-rise-of-data-privacy-laws\/","datePublished":"2019-08-28","dateModified":"2021-09-22","mainEntityOfPage":"https:\/\/www.grossmcginley.com\/resources\/blog\/the-rise-of-data-privacy-laws\/","author":{"@type":"Person","@id":"https:\/\/www.grossmcginley.com\/resources\/author\/kara-beck\/#Person","name":"Kara Beck","url":"https:\/\/www.grossmcginley.com\/resources\/author\/kara-beck\/","identifier":52,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/ee1d3107ccff5a7f13b87d09ce8f68c7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ee1d3107ccff5a7f13b87d09ce8f68c7?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Gross McGinley, LLP","logo":{"@type":"ImageObject","@id":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2017\/10\/logopng-00436945-e1531508982151.png","url":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2017\/10\/logopng-00436945-e1531508982151.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2019\/08\/internet-attorneys.jpg","url":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2019\/08\/internet-attorneys.jpg","height":800,"width":800},"keywords":["Internet","Privacy & Media","Privacy and Data Security"]},{"@type":"BlogPosting","@id":"https:\/\/www.grossmcginley.com\/resources\/blog\/medical-device-vulnerable-to-hackers\/","headline":"Medical Device Vulnerable to Hackers","url":"https:\/\/www.grossmcginley.com\/resources\/blog\/medical-device-vulnerable-to-hackers\/","datePublished":"2019-06-05","dateModified":"2021-09-21","mainEntityOfPage":"https:\/\/www.grossmcginley.com\/resources\/blog\/medical-device-vulnerable-to-hackers\/","author":{"@type":"Person","@id":"https:\/\/www.grossmcginley.com\/resources\/author\/jlw\/#Person","name":"Jennifer L. Weed","url":"https:\/\/www.grossmcginley.com\/resources\/author\/jlw\/","identifier":37,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/4a94ee97ce4ebeb86eb75de61fd173b2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4a94ee97ce4ebeb86eb75de61fd173b2?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Gross McGinley, LLP","logo":{"@type":"ImageObject","@id":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2017\/10\/logopng-00436945-e1531508982151.png","url":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2017\/10\/logopng-00436945-e1531508982151.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2019\/06\/medtronic-device-vulnerability-law.jpg","url":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2019\/06\/medtronic-device-vulnerability-law.jpg","height":800,"width":800},"keywords":["Internet","Medical Malpractice Defense","Privacy & Media","Privacy and Data Security"]},{"@type":"BlogPosting","@id":"https:\/\/www.grossmcginley.com\/resources\/blog\/why-your-business-needs-an-emergency-plan\/","headline":"Why Your Business Needs An Emergency Plan","url":"https:\/\/www.grossmcginley.com\/resources\/blog\/why-your-business-needs-an-emergency-plan\/","datePublished":"2019-02-11","dateModified":"2021-09-20","mainEntityOfPage":"https:\/\/www.grossmcginley.com\/resources\/blog\/why-your-business-needs-an-emergency-plan\/","author":{"@type":"Person","@id":"https:\/\/www.grossmcginley.com\/resources\/author\/john-gross\/#Person","name":"John F. \"Jack\" Gross","url":"https:\/\/www.grossmcginley.com\/resources\/author\/john-gross\/","identifier":13,"image":{"@type":"ImageObject","@id":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2021\/02\/John-F-Jack-Gross-headshot-150x150.jpg","url":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2021\/02\/John-F-Jack-Gross-headshot-150x150.jpg","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Gross McGinley, LLP","logo":{"@type":"ImageObject","@id":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2017\/10\/logopng-00436945-e1531508982151.png","url":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2017\/10\/logopng-00436945-e1531508982151.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2019\/02\/business-emergency-plan.jpg","url":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2019\/02\/business-emergency-plan.jpg","height":800,"width":800},"keywords":["Business Law","Privacy and Data Security"]},{"@type":"BlogPosting","@id":"https:\/\/www.grossmcginley.com\/resources\/blog\/2019-business-banking-outlook\/","headline":"2019 Business and Banking Outlook","url":"https:\/\/www.grossmcginley.com\/resources\/blog\/2019-business-banking-outlook\/","datePublished":"2018-12-18","dateModified":"2021-09-20","mainEntityOfPage":"https:\/\/www.grossmcginley.com\/resources\/blog\/2019-business-banking-outlook\/","author":{"@type":"Person","@id":"https:\/\/www.grossmcginley.com\/resources\/author\/thomas-reilly\/#Person","name":"Thomas E. Reilly, Jr.","url":"https:\/\/www.grossmcginley.com\/resources\/author\/thomas-reilly\/","identifier":29,"image":{"@type":"ImageObject","@id":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2021\/01\/gross-mcginley-thomas-reilly-attorney-150x150.jpg","url":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2021\/01\/gross-mcginley-thomas-reilly-attorney-150x150.jpg","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Gross McGinley, LLP","logo":{"@type":"ImageObject","@id":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2017\/10\/logopng-00436945-e1531508982151.png","url":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2017\/10\/logopng-00436945-e1531508982151.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2018\/12\/2019-business-banking-outlook.jpg","url":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2018\/12\/2019-business-banking-outlook.jpg","height":800,"width":800},"keywords":["Banking Law","Banking Matters","Business Law","Internet","Privacy & Media","Privacy and Data Security"]},{"@type":"BlogPosting","@id":"https:\/\/www.grossmcginley.com\/resources\/blog\/self-incrimination-denied-court-compels-computer-password\/","headline":"Self-Incrimination Denied as Court Compels Computer Passwords","url":"https:\/\/www.grossmcginley.com\/resources\/blog\/self-incrimination-denied-court-compels-computer-password\/","datePublished":"2017-12-14","dateModified":"2025-01-31","mainEntityOfPage":"https:\/\/www.grossmcginley.com\/resources\/blog\/self-incrimination-denied-court-compels-computer-password\/","author":{"@type":"Person","@id":"https:\/\/www.grossmcginley.com\/resources\/author\/michael-blum\/#Person","name":"Michael J. Blum","url":"https:\/\/www.grossmcginley.com\/resources\/author\/michael-blum\/","identifier":10,"image":{"@type":"ImageObject","@id":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2020\/01\/michael-blum-lawyer-promoted-150x150.jpg","url":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2020\/01\/michael-blum-lawyer-promoted-150x150.jpg","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Gross McGinley, LLP","logo":{"@type":"ImageObject","@id":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2017\/10\/logopng-00436945-e1531508982151.png","url":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2017\/10\/logopng-00436945-e1531508982151.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2017\/12\/court-compels-computer-password.jpg","url":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2017\/12\/court-compels-computer-password.jpg","height":800,"width":800},"keywords":["Criminal Law","Internet","Internet Law","Privacy","Privacy and Data Security"]},{"@type":"BlogPosting","@id":"https:\/\/www.grossmcginley.com\/resources\/events\/join-the-discussion-this-june-digital-marketing-risks\/","headline":"Join the Discussion this June: Digital Marketing Risks","url":"https:\/\/www.grossmcginley.com\/resources\/events\/join-the-discussion-this-june-digital-marketing-risks\/","datePublished":"2016-05-09","dateModified":"2021-05-18","mainEntityOfPage":"https:\/\/www.grossmcginley.com\/resources\/events\/join-the-discussion-this-june-digital-marketing-risks\/","author":{"@type":"Person","@id":"https:\/\/www.grossmcginley.com\/resources\/author\/kimberly-spotts-kimmel\/#Person","name":"Kimberly Spotts-Kimmel","url":"https:\/\/www.grossmcginley.com\/resources\/author\/kimberly-spotts-kimmel\/","identifier":5,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/6c66e0083a0d0d84a753e87e22759579?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6c66e0083a0d0d84a753e87e22759579?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Gross McGinley, LLP","logo":{"@type":"ImageObject","@id":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2017\/10\/logopng-00436945-e1531508982151.png","url":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2017\/10\/logopng-00436945-e1531508982151.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2016\/05\/student-laptop.jpg","url":"https:\/\/www.grossmcginley.com\/wp-content\/uploads\/2016\/05\/student-laptop.jpg","height":800,"width":800},"keywords":["Business Law","Intellectual Property","Internet Law","Privacy & Media","Privacy and Data Security"]}]}