Practice Areas

News & Insights

  • BIOMETRIC INFORMATION PRIVACY ACT: PART ONE OF A FOUR-PART SERIES

    The Illinois Biometric Information Privacy Act (“BIPA”) provides a private right of action and statutory damages to address risks associated with the use of biometric data. Given that the statute’s interpretation is in a current state of flux with recent court rulings, it is important for any private entity using biometric data to understand its basic elements and impact. Corporate Law Attorneys Jeff Davis and Patrick Coonan walk us through the first part of this series: the basics. This informative summary highlights key biometric identifiers, including their applications and advantages. Additionally, it highlights how BIPA imposes five requirements, including consent and written notification. Part Two of this series will examine potential risks and mitigation strategies.

    Read More
  • WBS Partner Presents on Real Estate Issues

    Real Estate and Corporate Practice Group Partner, Andy Arons, had the pleasure of leading a presentation at the IICLE Family Law Institute regarding real estate and contractual issues arising in co-habitation agreements between unmarried partners. Andy would like to thank his co-presenter, family law attorney Candace Meyers and the Illinois Institute for Continuing Legal Education for the opportunity. For more information on the event, please visit: https://www.iicle.com/FLI22 and for more information on Andy, please visit: http://wbs-law.com/attorneys/andrew-d-arons/

    Read More
  • AVOIDING IT CONTRACT LIABILITY TRAPS: TOP 10 RESOLUTIONS TO STILL KEEP

    Don't let 2022 be the year your organization is behind in the IT development curve and facing possible contract liability exposure. It's always a good practice to perform an annual self "check-up" on your organization's Information Technology operations. Attorney Jeff Davis walks us through in detail a checklist of 10 IT goals every organization should consider at least annually to assess its IT "health." This informative list should enable a workable, systematic approach to identifying and mitigating IT risks, and potentially avoiding extraordinary and unbudgeted IT costs.

    Read More