News & Analysis as of

Internet of Things Bring Your Own Device (BYOD)

Reveal

There Are More Challenges in Managing Discovery in Healthcare Than You Probably Realize

Reveal on

A few months ago on this blog, I wrote about using Artificial Intelligence (AI) to keep up with the “alphabet soup” of compliance. An important area to address from a compliance standpoint is health data and at least two of...more

Wiley Rein LLP

Wireless Roundup (October 2020)

Wiley Rein LLP on

Upcoming Filing and Comment Deadlines - FCC Seeks Comment on Emergency Access to Wi-Fi Access Points: Comments are due October 1 on the Federal Communications Commission’s (FCC or Commission) Public Notice seeking comment...more

NAVEX

Tame the Data Monster with a Prioritized Threat List - June 2019

NAVEX on

The more things change, the more things stay the same. As compliance matures as an industry, we sometimes forget the foundational best-practices that our programs are built upon. Every last Friday of the month, we revisit...more

NAVEX

Tame the Data Monster with a Prioritized Threat List

NAVEX on

You’ve just been sued. Your first thought might not be about data, but your second or third one should be. Information is the lifeblood of the modern corporation, but it can also be its Achilles heel. Terabytes of business...more

Seyfarth Shaw LLP

“Opening Clauses” and the GDPR – It Might Not Be As Easy As We Thought

Seyfarth Shaw LLP on

The General Data Protection Regulation is coming, and along with it, a significant expectation of increased harmonization in the privacy rules across the EU. Considering the 60-plus articles which directly impose obligations...more

Manatt, Phelps & Phillips, LLP

Health Update - June 2017

HIPAA and Emerging Technologies - Editor’s Note: According to a HIMSS Mobile Technology Survey of healthcare provider employees, about 90% say they are using mobile devices to engage patients in their healthcare—and 36%...more

Morgan Lewis

Navigating the IoT Workplace Quagmire

Morgan Lewis on

The Internet of Things (IoT) promises a societal transformation based on a virtuous circle of constantly improving connectivity, integration, data, intelligence, and automation. One important element of this transformation is...more

K2 Integrity

Understanding the DNS Attacks: Convenience v Security

K2 Integrity on

How Did This Attack Happen? While the attack is still under investigation, initial reports indicate that it was part of a genre of DDoS that infects Internet of Things (IoT) devices, such as webcams, DVRs, routers, smart TVs,...more

Foley & Lardner LLP

Worker Privacy and Security in an Internet of Things

Foley & Lardner LLP on

The Internet of Things (IoT) refers to the phenomenon of everyday objects like phones, refrigerators, and cars connecting to the internet in order to send and receive data. While the IoT promises a future of convenience and...more

9 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide