News & Analysis as of

Software Technology

Your “Mashup” of eDiscovery Market Estimates is Even Earlier This Year: eDiscovery Trends

by CloudNine on

We look forward to the eDiscovery Market Size Mashup that Rob Robinson compiles and presents on his Complex Discovery site each year. Each of the first three years that we covered it, the Mashup was released in July – with...more

Cloudflare Software Bug Causes Data Leak

Cloudflare, Inc., a provider of performance and security solutions for websites, recently disclosed that a software bug caused it to leak customer data that was then cached by search engines. Uber, Fitbit, and OkCupid sites...more

A Host of Biometric Privacy/Facial Recognition Bills Currently Circulating in State Legislatures

We’ve written extensively about the numerous lawsuits, dismissals and settlements surrounding the Illinois Biometric Information Privacy Act (BIPA). The statute, generally speaking, prohibits an entity from collecting,...more

Artificial Intelligence: Transforming the Way We Create and Consume Content

by Reed Smith on

Artificial intelligence (intelligence exhibited by machines; AI) is experiencing rapid growth, evident from last year’s record levels of investment in this industry. AI has also already taken centre stage this year by...more

No Harm, But Foul? FTC Sues Internet of Things Maker D-Link for Security “Vulnerabilities” Despite No Allegations of Breach

by Orrick - Trust Anchor on

Shortly after the new year, the Federal Trade Commission filed suit in the Northern District of California against D-Link Corporation, a Taiwan-based maker of wireless routers, Internet Protocol (IP) cameras, and software...more

Biometric Privacy Claims over Facial Recognition Feature in Videogame Dismissed for Lack of Concrete Harm

For the second time in the past six months, a district court has dismissed a lawsuit alleging procedural and technical violations of the Illinois biometric privacy statute for lack of Article III standing. In Vigil v....more

Employment Law Navigator – Week in Review: January 2017 #4

by Zelle LLP on

Last week, the Second Circuit Court of Appeals was asked to overturn its own precedent in a case involving discrimination on the basis of sexual orientation. The case was brought by an advertising executive who alleged that...more

Toys Not Immune from Scrutiny Over Privacy and Security Weaknesses

In the wake of the holiday season, it seems that even toys are not immune from privacy and security pitfalls. Two “connected” toys, Genesis Toys’ My Friend Cayla and i-Que robot, have been accused of violating U.S. and...more

Artificial Intelligence Litigation: Can the Law Keep Pace with The Rise of the Machines?

Artificial intelligence, or AI, is the broad conceptual term for the technologies or systems making it possible for computers to perform tasks involving human-like decisionmaking, intelligence, learned skills and/or...more

IP Part 3: Enforcing Your Intellectual Property

by Varnum LLP on

"We are certainly flattered by your affection for the brand" - Christy Susman made news for her surprisingly kind words to Patrick Wensink, author of Broken Piano for President, in a cease-and-desist letter after...more

Autonomous Vehicle Business Models: How Will You ‘Own’ One?

by LeClairRyan on

Google, Uber, and several major automakers are working to bring autonomous vehicles (i.e. self-driving cars) to the marketplace. In mid-October 2016, Tesla announced that three of its models will be fitted with all the...more

Are You Allowed to Jailbreak Your Car? As of Today, the Answer is Yes.

by Buchalter on

Modern automobiles are operated by dozens of computers, known as Electronic Control Units or ECUs, which control almost all of the main functions in a vehicle, including engine control, fuel efficiency, and breaking. The...more

US Implements Regulation Changes for Encryption Products, Software and Technology

On September 20, 2016, the Bureau of Industry and Security (BIS) of the U.S. Commerce Department amended the Export Administration Regulations (EAR) and the list of goods, software and technology that are controlled under the...more

Lemon Laws: Potentially a Sour Future for Manufacturers of Autonomous Vehicles

by Varnum LLP on

Lemon laws have existed for several decades to protect consumers from permanently defected vehicles. Though they may vary state to state, lemon laws generally require manufacturers to replace or reimburse consumers for...more

Employment Law Navigator – Week in Review: August 2016 #3

by Zelle LLP on

Last week, Vanity Fair reported that the ongoing settlement talks between Gretchen Carlson and Roger Ailes may contemplate a settlement payment in the eight-figure range as more and more women claim sexual harassment by the...more

Federal Circuit Expanding Interpretation of Step Two of the Test for Patent Eligibility

by White & Case LLP on

The Federal Circuit recently reversed a district court's decision granting a motion to dismiss a patent under 35 U.S.C. § 101 in Bascom Global Internet Services, Inc. v. AT&T Mobility LLC.[1] The patent-in-suit, U.S. Patent...more

Effective calendaring and email systems prevent claims Whoops – Legal Malpractice Prevention

by Dentons on

Computers and technology have changed every aspect of the modern law practice. Email, for instance, has completely transformed the practice of law. Electronic communication is instantaneous, continuous, and ubiquitous. It is...more

Blue Calypso, LLC v. Groupon, Inc. (Fed. Cir. 2016)

On March 1, 2016, the Federal Circuit issued an opinion in a number of related appeals between Blue Calypso, LLC and Groupon, Inc. These related appeals arise from five Covered Business Method (CBM) reviews of five patents...more

EU Control List Update

by Dechert LLP on

The European Commission is revising the list of dual use items subject to EU export, transit and brokering controls. This briefing summarises the main new and deleted entries, primarily concerning machine tools, avionics...more

[Event] 2015 Cybersecurity Seminar: Identifying and Mitigating Data Breaches and Related Liabilities - Oct. 29th, Richmond, VA

by Williams Mullen on

October is National Cyber Security Awareness Month! Please join Williams Mullen, Marsh and EY for an in-depth discussion on effective strategies for identifying and mitigating data breach and related liabilities. WHO...more

Ch-Ch-Ch-Ch-Changes: USPTO Pilot Program on Changing Technology

As you may have heard, the USPTO has commenced a pilot program to allow, under limited circumstances, amendments to identifications of goods/services in trademark registrations to account for evolving technology. Amendments...more

[Event] 2015 FOLEYTech Summit - October 1, Boston, MA

by Foley & Lardner LLP on

Please join us for the 2015 FOLEYTech Summit. In its 11th year, the FOLEYTech Summit continues to offer the top-notch industry insight and compelling speakers you have come to expect from Foley & Lardner LLP, while embracing...more

At the edge of a new frontier: USCIS begins transition to Electronic Immigration System

In July 2015, the White House announced a series of technology initiatives aimed at modernizing the application process for certain immigration benefits. As part of this effort, the United States Citizenship and Immigration...more

2015 Form 1095-C Reporting: IT Vendor Survey

by Balch & Bingham LLP on

On August 18, 2014, we posted our, “First Look at ACA Employer Compliance Software.” It’s time for an update. We invited less than a dozen vendors to answer these twenty-two questions....more

Jeep Hack Drives Cyber, Crisis, Liability and Supply Chain Coverage Issues

by Wilson Elser on

A recall notice to fix critical control software on 1.4 million vehicles should raise concerns for companies, brokers and insurers across several business lines. The vulnerability of vital control systems to a remote hacking...more

77 Results
|
View per page
Page: of 4
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
Feedback? Tell us what you think of the new jdsupra.com!