News & Analysis as of

Technology Cloud Computing

“The Future is Now” — Compliance and Technology

by Michael Volkov on

This posting is not a “pie in the sky” outline of compliance in the future, when technology works seamlessly with compliance functions. My focus today is on what is happening now in the compliance world when it comes to...more

Cloudflare Software Bug Causes Data Leak

Cloudflare, Inc., a provider of performance and security solutions for websites, recently disclosed that a software bug caused it to leak customer data that was then cached by search engines. Uber, Fitbit, and OkCupid sites...more

Privacy and Data Security: 2017 Year in Preview

by Polsinelli on

Few issues keep executives awake at night more than Privacy and Data Security. New regulations and threats alike are plentiful, varied, and evolving. The rate of change for cybersecurity and information governance continues...more

Box, OneDrive, a Combination—What’s Your Flavor?

The cloud-based file-sharing and collaboration business continues to grow, inspiring competition between two heavy weights: Microsoft and Box. Last week, Box announced over $100 million in third quarter revenue growth...more

Understanding the DNS Attacks: Convenience v Security

How Did This Attack Happen? While the attack is still under investigation, initial reports indicate that it was part of a genre of DDoS that infects Internet of Things (IoT) devices, such as webcams, DVRs, routers, smart TVs,...more

Autonomous Vehicles and the Internet of Things

by LeClairRyan on

This is our second post in a row regarding autonomous vehicles, otherwise referred to as driverless cars. As we noted last week, driverless cars are no longer an idea of the future or science-fiction. Very soon they will...more

Regtech rising: Automating regulation for financial institutions

by White & Case LLP on

Regulatory compliance is timeconsuming and expensive for both financial institutions and regulators. The volume of information that parties must monitor and evaluate is enormous. The rules are often complex and difficult to...more

Gartner identifies future cyber security technologies to fight cyber crime

A recent Gartner report has identified what it believes to be the Top 10 Cyber Security Technologies for the future to assist businesses with combating cyber crime....more

eWorkplace Policies Restricting Employees’ Acceptable Use of Technology, Social Media & The Cloud

by Fenwick & West LLP on

I. OVERVIEW – THE MODERN LANDSCAPE - A. Physical Conduct PLUS Digital Activity - Traditional concerns for employers have included: conduct leading to liability to third-parties; “frolic and detour” or other...more

Court of Appeal Upholds Injunction Against Google (Equustek Solutions Inc. v. Google Inc.)

by Field Law on

Apparently Google does not appreciate being ordered by a Canadian court to remove worldwide search results. In Update on Injunction Against Google (Equustek Solutions Inc. v. Google Inc.) we reviewed a 2014 decision in which...more

New Technologies Test the Limits of the Duty to Preserve, Collect and Produce Information in Civil Discovery

by Morrison & Foerster LLP on

While the question of whether specific records are within a party’s possession, custody or control has been heavily litigated for years, the digital revolution — with the advent of social media, cloud computing and mobile...more

Cloudy Days….Where Next for Outsourcing?

by DLA Piper on

In recent times, we have seen an increasing number of deals where the required services have been delivered from the cloud, i.e., from remotely hosted solutions, usually (albeit not always) offered on a “one to many” basis...more

Meritas in the Cloud: The Digital Law Office

Technological innovations in the digitization of information and communications have greatly changed the practice of law in the past decade and will undoubtedly continue to do so at an accelerating pace. While lawyers and law...more

Business Litigation Report -- December 2014

In This Issue: Main Article: - Cloud Computing: Legal Issues on the Horizon Noted With Interest: - Stays Pending Covered Business Method Patent Review: VirtualAgility v....more

Privacy in the Cloud: A Legal Framework for Moving Personal Data to the Cloud

For many companies, the main question about cloud computing is no longer whether to move their data to the “cloud,” but how they can accomplish this transition. Cloud (or Internet-based on-demand) computing involves a shift...more

5 Compliance “Hot Spots” for Technology Companies Under Export Controls and Sanctions Laws

by Latham & Watkins LLP on

Increasingly interconnected global businesses need to focus on how export controls and trade sanctions can affect their cross-border activities in unexpected ways. For decades, the US Government has used trade...more

Top 10 Technology Blunders for Employers

As one who presumably has no nude selfies, you may not be too concerned about a “hack” like the one that continues to afflict celebrities like Jennifer Lawrence and Kate Upton. But that doesn’t mean there aren’t still plenty...more

2014 Outsourcing Market Assessment

Catching the Fourth Wave: Cloud Computing Driving Outsourcing Transactions in 2014 - The first half of 2014 has shown a measured uptick in the volume of outsourcing transactions. Industry experts predicted a 12...more

Cloud Computing: Evolving Contracting Practices

by Davis Wright Tremaine LLP on

The explosion of cloud computing is creating new common standards and changing industry contracting practices for access to these services. Cloud services providers tend to provide standard contractual terms that are largely...more

The European Technology Index: Technology – An engine for growth?

by DLA Piper on

In 2012, in light of the Euro crisis and uncertainty of a double dip recession, DLA Piper launched the first Tech Index survey. This was to review the perceptions and attitudes of European technology growth in light of market...more

Alarming Statistics On Cloud Use

by Scott & Scott, LLP on

Scott & Scott, LLP attorney, Brian Von Hatten, says Softchoice's survey findings should sound alarms for IT administrators and risk managers. ...more

New Tools to Comply with the Brown Act and Increase Transparency

by Best Best & Krieger LLP on

Meeting management is big business for governments at every level, and the recent enactment of SB 751 has many public agencies reviewing the policies and tools they use to manage their public meetings. SB 751 requires...more

e-Disclosure - A guide to your obligations

by DLA Piper on

Developments in technology have revolutionised the way in which business is conducted. The increasing use of cloud services, mobile devices and social media have led to a dramatic rise in the volume of day-to-day business...more

Technical Data v. Technology

by Baker Donelson on

As you may know, the United States’ export control regime controls items, services, and information through regulations enforced by the State, Commerce, and Treasury Departments. Since all three departments promulgate their...more

Wearable tech and healthcare sector

by DLA Piper on

Wearable technologies are likely to become more and more popular in the next years and interesting products have already been developed in the healthcare sector. But, given the sensitivity of collected personal data, such...more

31 Results
|
View per page
Page: of 2
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.