News & Analysis as of

Technology Data Protection Today's Popular Updates

Butler Snow LLP

A New Look at an Old Hot Topic: The Internet of Things

Butler Snow LLP on

In 1999, computer scientist Kevin Ashton coined the term “the Internet of Things” (“IoT”) in order to put a name to his idea of using RFID chips to track items as they moved throughout a supply chain. “Though there is no...more

Skadden, Arps, Slate, Meagher & Flom LLP

Understanding SEC’s Focus Amid Lack of Final AI Rules

Last year, the U.S. Securities and Exchange Commission (SEC) proposed ambitious rules relating to artificial intelligence (AI) that have drawn significant commentary and criticism. While it is unlikely that any changes in the...more

J.S. Held

Inside the Healthcare Industry: Understanding Emerging Data Privacy & Security Risks and Regulations

J.S. Held on

According to the Theft Resource Center and its 2022 data breach reports, data privacy and security threats are impacting all aspects of the healthcare industry – from providers to payers to medical device companies to...more

Health Care Compliance Association (HCCA)

Artificial intelligence: Compliance considerations for provider organizations

Artificial intelligence (AI) is nothing new to the healthcare industry, as many organizations and clinicians have utilized such tools in some capacity for many years. Imaging-related AI to support radiologists is not...more

Alston & Bird

FTC Launches Investigation into Creator of ChatGPT

Alston & Bird on

In mid-July, the Federal Trade Commission (FTC) reportedly opened an investigation into OpenAI, the maker of ChatGPT, sending the company an extensive Civil Investigative Demand (CID). While FTC investigations are normally...more

White & Case LLP

Cybersecurity Developments and Legal Issues

White & Case LLP on

For most large companies, a frictionless flow of information and the ability to transfer customer data, employee files, financial records and other information around the world quickly and cost-effectively is a critical...more

Holland & Knight LLP

Quantum Computing: Examining the Quantum Computing Cybersecurity Preparedness Act

Holland & Knight LLP on

In the waning days of 2022 and the 117th Congress, President Biden signed H.R.7535, the Quantum Computing Cybersecurity Preparedness Act, into law. The law recognizes the future threat that quantum decryption poses to federal...more

Health Care Compliance Association (HCCA)

Report on Patient Privacy Volume 23, Number 1. Outlook 2023: Ransomware Threats Multiply as Rogue Nation-States Sponsor More...

Report on Patient Privacy Volume 23, no 1 (January 2023) Ransomware—including increased attacks from criminal groups affiliated with rogue nation-states such as Russia and North Korea—will continue to dominate the health...more

BakerHostetler

Modeling the Privacy Catwalk: Practical Steps Forward

BakerHostetler on

What’s Trending? (Privacy a la Mode) - Notable fashion brands have been engaging in a “trial period” of new technologies as privacy laws and privacy enforcement are trending – for example, exploring integrating branding...more

Perkins Coie

Enforcement Trends From China’s Cyberspace Regulator in 2022

Perkins Coie on

China’s internet watchdog, the Cyberspace Administration of China (CAC), has continued to tighten its regulation of internet industries and driven the formulation of many new laws and regulations in cybersecurity and data...more

Perkins Coie

FCC Examines Cybersecurity Vulnerabilities Following Russian Invasion of Ukraine

Perkins Coie on

The U.S. Federal Communications Commission (FCC) published a Notice of Inquiry (NOI) on February 28, 2022, inviting public comment on vulnerabilities that threaten the security and integrity of the Border Gateway Protocol...more

Foley & Lardner LLP

Live, Work and Play in a Legal Metaverse: Preparing for a New Online Existence

Foley & Lardner LLP on

Companies spend billions and invest heavily in technologies that offer greater telepresence and enable an individual’s digital life. Will humans interact with each other via avatars in a three-dimensional virtual space? The...more

Womble Bond Dickinson

Operational Technology: New Target For Network Security Obligations

Womble Bond Dickinson on

The past two decades have produced intense focus on information security to protect data. This priority remains important. But the change in administrations and the Continental Pipeline incident have redirected attention...more

Sheppard Mullin Richter & Hampton LLP

Is it Time to Make AR and VR a Part of Your Reality?

To date, there are over 1 billion augmented reality (“AR”) users and 171 million virtual reality (“VR”) users worldwide[1], a number that continues to increase as more industries turn to AR and VR to create immersive user...more

Farrell Fritz, P.C.

Hey Google: Are You Alone?

Farrell Fritz, P.C. on

Smart speakers – like Google Home and Amazon Echo – have changed the way our homes/offices function. Indeed, these voice-activated speakers execute simple commands provided by voice or smartphone application. With nothing...more

King & Spalding

Maritime Cybersecurity Regulation on the Horizon

King & Spalding on

Over the past year, various institutions and organizations—both domestic and international—have shown an interest in moving the increasingly prevalent cybersecurity conversation offshore. Domestically, both Congress and...more

Bradley Arant Boult Cummings LLP

Federal and State Authorities Take First Steps Toward Regulating Blockchain, Mobile Banking and Digital Financial Services

Last week, federal and state lawmakers took significant steps toward specific regulations targeting digital financial technology, mobile banking and cybersecurity, signaling the possibility of wholesale changes to the legal...more

Robinson+Cole Data Privacy + Security Insider

Gartner identifies future cyber security technologies to fight cyber crime

A recent Gartner report has identified what it believes to be the Top 10 Cyber Security Technologies for the future to assist businesses with combating cyber crime....more

Williams Mullen

[Event] 2015 Cybersecurity Seminar: Identifying and Mitigating Data Breaches and Related Liabilities - Oct. 29th, Richmond, VA

Williams Mullen on

October is National Cyber Security Awareness Month! Please join Williams Mullen, Marsh and EY for an in-depth discussion on effective strategies for identifying and mitigating data breach and related liabilities. WHO...more

Fenwick & West LLP

Litigation Alert: The CJEU's Decision on Safe Harbor and its Effects on US Technology Companies

Fenwick & West LLP on

The CJEU’s Decision on Safe Harbor and its Effects on US Technology Companies - On October 6, 2015, the Court of Justice of the European Union (“CJEU”), the European Union’s highest court, issued a groundbreaking...more

K&L Gates LLP

Internet of Things – What does it mean for business?

K&L Gates LLP on

What is the Internet of Things? The 'Internet of Things' (IoT) is a catchphrase describing the increasing interconnectedness between smart devices and sensors facilitated through their connection to the internet. It's not a...more

Carlton Fields

RadioShack’s Consumer Data: A Highly Scrutinized Asset

Carlton Fields on

Following the Texas Attorney General’s objection to the sale of RadioShack Corporation’s consumer data as an asset in its bankruptcy, 37 other state attorneys general and a large number of other consumer protection entities...more

Wilson Sonsini Goodrich & Rosati

French Data Protection Authority Unveils Its Inspection Program for 2015

On May 25, 2015, the French data protection authority (CNIL) published its annual inspection program for 2015, unveiling its objectives and priorities for the year. This alert highlights the main priorities of the CNIL for...more

Morrison & Foerster LLP - Social Media

Privacy in the Cloud: A Legal Framework for Moving Personal Data to the Cloud

For many companies, the main question about cloud computing is no longer whether to move their data to the “cloud,” but how they can accomplish this transition. Cloud (or Internet-based on-demand) computing involves a shift...more

24 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide