News & Analysis as of

Software Developers Data Protection

BCLP

AI Developers - Make Sure You Are Compliant With the GDPR!

BCLP on

The CNIL’s newly released recommendations for AI system developers set out the regulator’s expectations for the entire development process of an AI system, from design to database creation and integration, ensuring...more

HaystackID

U.S. Unveils Historic Sanctions Against Intellexa Spyware for Endangering Privacy and National Security

HaystackID on

Editor's Note: In a historic and bold move, the U.S. government has implemented unprecedented sanctions against the Intellexa Consortium and its key figures for their roles in deploying spyware that jeopardizes privacy and...more

Robinson+Cole Data Privacy + Security Insider

CISA Alerts Manufacturers to Eliminate Default Passwords

On December 15, 2023, the Cybersecurity & Infrastructure Security Agency (CISA) issued a Secure by Design Alert and guidance on “How Manufacturers Can Protect Customers by Eliminating Default Passwords.”...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

Spilman Thomas & Battle, PLLC

Tech Vendors and Cybersecurity – Are They Responsible?

It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you if its product is compromised and results in a data...more

Polsinelli

The Structure of Data Rights in a Post-On-Premises World

Polsinelli on

As society moves away from the use of on-premises software into a modern world in which software vendors offer software and services through online, hosted environments, new challenges and trends related to data use and...more

Morgan Lewis - Tech & Sourcing

Contract Corner: A Buyers’ Guide to Navigating Data Security Provisions in SaaS Agreements

In the era of digital transformation, businesses increasingly rely on software-as-a-service (SaaS) solutions for various operational needs. For a buyer, it is crucial to prioritize data security when negotiating SaaS...more

Dechert LLP

Dechert Cyber Bits - Issue 30

Dechert LLP on

Cybersecurity Alert: Silicon Valley Bank and Signature Bank Fallout - Undoubtedly, cyber criminals are out in full force with phishing links and other scams trying to capitalize on the disruption and panic that many...more

Morgan Lewis - Tech & Sourcing

Contract Corner: Key Components of SaaS Contracts

Software as a service (SaaS) is a distribution model where the software vendor hosts their software on their own servers, or the cloud, as opposed to the customer purchasing the software for use on their own on-premises...more

Pillsbury Winthrop Shaw Pittman LLP

New Biden Administration Cyber Strategy Proposes Dramatic Shift in Order to Hold Software Developers Liable for “Insecure”...

The Strategy’s liability proposal represents a fundamental change in the cybersecurity market for software markers. Proposed legislation would seek to restrict software providers’ ability to limit liability while also...more

Akin Gump Strauss Hauer & Feld LLP

NIST Seeks Public Comment on Eight Emerging Technology Areas to Advance More Productive Tech Economy

The National Institute of Standards and Technology (NIST) issued a request for public comment to help guide the development of the current and future state of technology in eight emerging technology areas. Those areas include...more

Epiq

Software Escrow: An enterprise resiliency tool every legal department should have in their toolbox (with Don Dennis Jr.)

Epiq on

Jerich Beason is joined by Don Dennis, who is an attorney focusing on copyright and trademark infringement, Internet law, defamation, trade secret misappropriation, data security breach, and privacy law. Jerich and Don...more

Robinson+Cole Data Privacy + Security Insider

Software Development Teams: Are You Using JetBrains’ TeamCity?

Development and Operations (DevOps) teams are often pressured by executives and sales teams to get software products completed and out the door and into the market as quickly as possible so the products can generate income....more

Sheppard Mullin Richter & Hampton LLP

Controversial New Open Source License for Decentralized Apps – Protects Users’ Data and Cryptographic Keys

A controversial new open source license designed for use with decentralized applications was recently approved by the Open Source Initiative (OSI). The Cryptographic Autonomy License (CAL) claims to be the first open source...more

Sheppard Mullin Richter & Hampton LLP

FTC and Software Company Reach Security Settlement Over Unfair Practices

The FTC recently settled with Infotrax Systems, L.C. a technology company providing software to the direct sales industry. The settlement followed a breach suffered by the company, and involved allegations the company had...more

Dorsey & Whitney LLP

CCPA Requires “Reasonable Security”: but You Can’t have Reasonable Security Without Proper Vulnerability Management

Dorsey & Whitney LLP on

With the California Consumer Privacy Act (“CCPA”) set to take effect on January 1, 2020, and the resulting looming specter of statutory damages and data breach class action litigation for failure to implement “reasonable...more

Faegre Drinker Biddle & Reath LLP

NIST Unveils IoT Baseline of Core Cybersecurity Features for Comment

In a release aptly labeled “A Starting Point for IoT Device Manufacturers” the National Institute of Standards and Technology (NIST), an arm of the Department of Commerce, recently added to the discussion with the...more

Jones Day

Jones Day Global Privacy & Cybersecurity Update | Vol. 21

Jones Day on

UNITED STATES - Regulatory—Policy, Best Practices, and Standards - NIST Evaluates Advances in Face Recognition Software - On November 30, 2018, the National Institute of Standards and Technology ("NIST") published a...more

Holland & Knight LLP

HR Toolkit Series, Part 4 - Protecting Proprietary Information and Trade Secrets

Holland & Knight LLP on

In a recent Holland & Knight webinar, Partners Kara Ariail, Brandon Elledge, and Terry Elling discussed trade secrets and related issues affecting government contractors when employees are hired or leave. In case you missed...more

Foley & Lardner LLP

Automotive Industry Forum Preview: As the Auto Industry Transforms, It Grapples with Issues of Cybersecurity, IP & Connectivity

Foley & Lardner LLP on

The American automotive industry in no longer making your father’s Oldsmobile — not by a long shot. Today, pushed by evolving consumer behaviors, transformative technologies, and global market pressures, the automobile...more

K&L Gates LLP

K&L Gates Triage: Artificial Intelligence in Health Care

K&L Gates LLP on

Artificial Intelligence (AI) systems, including the use of algorithms and computer software to analyze complex data and perform certain decision making functions without direct human involvement, are rapidly developing in...more

Snell & Wilmer

Has Your Computer Been Hijacked For Illicit Cryptocurrency Mining?

Snell & Wilmer on

Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more

Fisher Phillips

Why Your Company Should Be Using Email Enterprise Vaults, Anti-Deletion Programming and Key Stroke Surveillance Software in the...

Fisher Phillips on

Twenty-five years ago most companies’ greatest fear of espionage was employee theft at the photocopy machine at 2 in the morning. The company playbook could not be forwarded in an email or put on a thumb drive in a matter of...more

Bass, Berry & Sims PLC

Privacy Perils: Avoiding the Spectre of a Meltdown

Bass, Berry & Sims PLC on

You recently may have heard news reports regarding new security threats known as "Meltdown" and "Spectre." Not to be mistaken for the latest Hollywood box-office offering, these new threats allow attackers to exploit a design...more

Patterson Belknap Webb & Tyler LLP

The Tanium Affair Reminds Us That Cybersecurity Risks Are Everywhere

The Wall Street Journal recently reported that well-known cybersecurity startup Tanium, Inc. had been inadvertently exposing one of its clients’ sensitive data during product demonstrations....more

33 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide