News & Analysis as of

Science, Computers & Technology General Business

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:

Kimpton Data Breach Decision Highlights Lingering Confusion on Standing Issues

When data thieves steal payment card data, consumers suffer no legally cognizable injuries. Card issuers absorb the fraudulent charges and replace the affected cards. Because fraudulent charges are not billed to consumers,...more

Host Country Benefits of Export Projects

by King & Spalding on

Hydropower, as an affordable, reliable and sustainable source of electricity, has played an important role in the growth and industrialisation of many emerging market economies, including Laos, Kenya, Sarawak (Malaysia),...more

HIPAA and the Cloud’s Shared Responsibility Models

by Snell & Wilmer on

Cloud-based service providers (CSPs), like Amazon Web Services and Microsoft Azure, offer online access to shared computing resources. As such, they have developed a “shared responsibility model” for how CSPs and companies...more

On the Ice with Artificial Intelligence

by Bennett Jones LLP on

Taking Wayne Gretzky's famous advice—"skate to where the puck is going, not where it has been"—will get easier for businesses that embrace artificial intelligence (AI). That's the conclusion I drew from a sold-out event...more

Planning ahead: the FCA's 2017/18 Business Plan priorities and strategic framework

by Hogan Lovells on

The FCA's latest Business Plan demonstrates a commitment to pushing forward on both existing and new initiatives across sectors, focused on maintaining fair consumer outcomes in the rapidly changing UK financial services...more

Modernisation of Dubai free zone regulations

by DLA Piper on

The Dubai Creative Clusters Authority (DCCA), formerly known as the Dubai Technology & Media Free Zone Authority or TECOM, which is the free zone authority with jurisdiction over nine Dubai Creative Cluster (DCC) free zones,...more

Lawmakers Push FCC To Confront Cell Phone Cyber Threats

by King & Spalding on

In a letter dated March 28, 2017, Senator Ron Wyden, D-Ore., and Representative Ted Lieu, D-Calif., urged the Federal Communications Commission (“FCC”) to address cybersecurity vulnerabilities in the cell phone industry,...more

Meet HAL, Your New Robo-Adviser: SEC Regulatory Guidance For Robo-Advisers

by Polsinelli on

“Hello, Dave. You're looking well today.” In the iconic science fiction movie, 2001: A Space Odyssey, the HAL 9000 computer courteously greeted his astronaut human companion Dave Bowman. HAL was a Heuristically...more

Data Privacy and Security Legal Reform, and Plaintiffs’ Bar White Paper the Focus of IAPP Panel

by Reed Smith on

A panel on legal reform in the area of privacy and data security at this week’s IAPP Summit provided an opportunity for a discussion between businesses and regulators, as well as for the launch of a white paper on the...more

Deeper Dive: Protecting Paper Records

by BakerHostetler on

Our third annual BakerHostetler Data Security Incident Response Report analyzes the more than 450 data security incidents we led clients through in 2016, and includes a number of interesting trends relating to the causes of...more

Breach Notification Update: New Mexico becomes the 48th State Requiring Breach Notification and Tennessee Adds a Safe Harbor for...

by Sedgwick LLP on

As the frequency of data breaches continues, so do legislative developments on notification requirements that must be met in the event of a breach of Personally Identifiable Information (PII). Even as of now, not every state...more

Six Tips to Consider in Hiring Privacy and Data Security Experts

by Jackson Lewis P.C. on

Facing increasingly pervasive issues relating to privacy and data security companies are faced with what qualifications they should think about when looking to hire experts in these areas, and their role within the company is...more

"The Emerging Need for Cybersecurity Diligence in M&A"

Cybercrime has emerged as one of the foremost threats a company faces. As a result of a few keystrokes, a company may find its customers’ data sold on the dark web, its intellectual property in the hands of a competitor or...more

Arizona Passes Groundbreaking Blockchain and Smart Contract Law – State Blockchain Laws on the Rise

The blockchain or “distributed ledger network” was originally conceived as the peer-to-peer technology platform that allows for the transfer of Bitcoin without the need for a trusted intermediary. However, the blockchain...more

UK: FCA 2017/2018 Business Plan - Sector priorities for general insurance

by Hogan Lovells on

In its recently published 2017/2018 Business Plan the FCA outlines its priorities for the general insurance sector over the coming year and beyond....more

InterContinental Hotels Reports Credit Card Breach

InterContinental Hotels Group (IHG) has reported a data breach of its payment card processing system. The breach involves malware that infected certain locations between September 29, 2016, and December 29, 2016. The malware...more

Brexit – the end of parallel imports from the UK?

by Hogan Lovells on

The United Kingdom's unprecedented vote to leave the EU will undoubtedly cause a broad range of legal issues in the future. This post focuses on the consequences of Brexit on parallel imports - a field of significant...more

French CNIL Releases GDPR Compliance Toolkit

by Alston & Bird on

On March 15, 2017, the French data protection authority (CNIL) released its six step- GDPR compliance program together with GDPR-tailored templates for use by companies, the “GDPR Toolkit.” The GDPR Toolkit is helpful for...more

The New Privacy Shield Twist

by Conduent on

The new Privacy Shield Framework was created to help American companies protect EU customer data privacy. However, in an unexpected twist, uncertainties may threaten the Privacy Shield: The White House passed a directive in...more

Processor BCRs Under the GDPR: Realizing the Potential

by Alston & Bird on

Binding Corporate Rules (BCRs) are an intracompany code of conduct that regulates the principles and rules that apply to the processing and transfer of personal data within a company group, including cross-border. BCRs were...more

New Mexico Enacts Data Breach Notification Act (Updated)

by Jackson Lewis P.C. on

New Mexico has become the 48th state to enact a data breach notification law requiring that individuals be notified of security breaches of information involving personal identifying information. Governor Susana Martinez...more

Deeper Dive: Frequency and Severity

by BakerHostetler on

All industries are affected by cyberattacks, but how often and to what extent they occur vary greatly by industry type. As for frequency, the healthcare industry in 2016, for the third year in a row, saw the greatest...more

"Delaware Law Amendments Would Facilitate Blockchain Maintenance of Corporate Records, Among Other Changes"

On March 27, 2017, the Corporation Law Section of the Delaware State Bar Association (DSBA) approved proposed amendments to the Delaware General Corporation Law (DGCL) that had been proposed by the DSBA Corporation Law...more

Be Compromise Ready: Go Back to the Basics

by BakerHostetler on

We are excited to release our third annual BakerHostetler Data Security Incident Response Report. This report analyzes the more than 450 data security incidents we led clients through in 2016. Companies continued to...more

Your Business Drone Crashed... What Do You Do?

by Rumberger Kirk & Caldwell on

Understanding FAA & NTSB Drone Accident Reporting Requirements - When a corporate drone crashes, it can be one of the worst-case scenarios for owners who rely on UAS technology to conduct a wide-array of business...more

5,971 Results
|
View per page
Page: of 239
Cybersecurity

Follow Science, Computers & Technology Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.

Feedback? Tell us what you think of the new jdsupra.com!