Latest Publications

Share:

Proposed H-1B Modernization – A Conversation with Shannon Donnelly

As part of our Spotlight series, we invited Shannon Donnelly, a partner in our Washington, DC office who works with clients on a wide range of complex global immigration and mobility issues, to discuss the proposed H1B...more

FTC Amends Safeguards Rule

The Federal Trade Commission (FTC) recently adopted a final rule amending its Standards for Safeguarding Customer Information (commonly referred to as the “Safeguards Rule”) to require financial institutions to report certain...more

California Enacts the Delete Act

In October, California enacted its newest privacy legislation, commonly referred to as the “Delete Act” (California Senate Bill No. 362). The Delete Act will allow consumers to request that any data broker that maintains any...more

2023 Tech & Sourcing Summit: A Summary

On October 25, the Morgan Lewis technology transactions, outsourcing, and commercial contracts team filled a room in New York with representatives from various industries who were looking to engage in interactive discussions...more

Contact Center Transformation Trends

Deloitte has issued a biennial report that identifies trends that are impacting customer/client contact center operations. The respondents surveyed by Deloitte represented both internal- and external-facing contact centers....more

Vice President Harris Announces New US Initiatives on AI Use

In addition to US President Joseph Biden’s recent executive order on artificial intelligence (AI), Vice President Kamala Harris recently announced a series of new US initiatives that will build on the executive order....more

Remote Work Employment Issues: A Conversation with David McManus and Emily DeSmedt

As part of our Spotlight series, we welcome David McManus, a partner in our New York office and the deputy leader of Morgan Lewis’s labor and employment practice, and Emily DeSmedt, a partner in our Princeton office, who...more

Governments Worldwide Accelerate Cloud Adoption

Although data security concerns may have held back early adoption, the COVID-19 pandemic accelerated cloud usage and digital transformation within public service organizations in many countries around the world. In a recent...more

Phishing: Proactive Measures to Guard Against Cyberattacks

Despite general awareness regarding phishing (we have written about phishing in a prior post), it still remains one of the most common ways to accomplish cyberattacks. It should be no surprise that cybercriminals are...more

Flood Insurance for Cyberattacks? A Federal Proposal

The US Treasury Department has issued a request for public comment on a federal cyberinsurance program that would aim to cover the costs associated with severe cyberattacks. The Federal Insurance Office (FIO) and the US...more

White House Publishes Blueprint for AI Bill of Rights

The White House Office of Science and Technology recently published The Blueprint for an AI Bill of Rights: Making Automated Systems Work for the American People (the Blueprint), a set of five principles to help guide...more

Contract Corner: Who Was That? Dealing With Turnover

In any service relationship, continuity of service provider personnel often impacts service quality. Excessive personnel turnover on an account can negatively impact day-to-day operations and the ability to respond to issues....more

What’s Driving the Future of Asia’s Tech Scene: Key Trends and Regulatory Updates

Heading into 2023, Asia’s tech scene is well-positioned for strong growth potential. As with any industry where advancement and innovation are outpacing regulation, the complex landscape can be difficult for businesses to...more

FTC Policy Statement on Health Breach Notification Rule: A Conversation with Reece Hirsch

As we start 2022, as part of our Spotlight series, we connect with Reece Hirsch, the co-head of Morgan Lewis’s privacy and cybersecurity practice, to discuss the recent policy statement issued by the US Federal Trade...more

Sounds Phishy – The Rise of Vishing Scams

Broad awareness has been made about cyberattacks in the form of phishing that typically use email messages to lure victims into divulging sensitive information or opening a link that allows malware to infiltrate their device....more

Protecting Data – Considerations for Drafting Security Schedules

With the exponential growth of cyber threats, cloud computing and remote working, contract provisions regarding data security requirements have also expanded in size and frequency. It has become common practice to prepare...more

Outsourcing: FINRA Outlines Onboarding and Supervision Suggestions for Use of Third-Party Vendors

A recent FINRA regulatory notice recasts existing obligations regarding outsourcing as a procedural roadmap for broker-dealers to “consider” when using third-party vendors. The Financial Industry Regulatory Authority, Inc....more

Service Locations and Remote Work Following COVID-19

In a March 2020 LawFlash, we highlighted that restrictions on service delivery locations and remote work could become key issues during the pandemic. Remote work was one of our five key issues in outsourcing and managed...more

Ezra Church and the Impact of the CCPA

Welcome to the second post in our Spotlight series, where we talk with a leader in a particular field or emerging area of interest to technology and sourcing lawyers and professionals. ...more

UTPL University Joint Patent Licensing Program Approved

The US Department of Justice (DOJ) announced on January 13 that it had completed its review of a proposed joint patent licensing pool known as the University Technology Licensing Program (UTLP) of 15 participating...more

Are Your IT Agreements COVID-19 Secure?

Cybersecurity has earned its place at the top of organizations’ risk concerns during the COVID-19 pandemic. Remote working, an array of communication solutions and hardware being used by organizations, and the accelerated...more

Germany: Consent Required – No Opt-Out for Cookies

The German Federal Court of Justice (BGH) ruled on May 28 that an opt-out for cookies settings is inadmissible under German law under Section 15(3) of the German Telemedia Act (TMG) in conformity with the ePrivacy Directive...more

Reexamining the Computer Fraud and Abuse Act

As the digital landscape in the United States evolves, federal courts are reexamining federal cybersecurity laws enacted during an era before individuals, companies, and the government had easy access to computers and the...more

Considering Facial Recognition Technology as Businesses Reopen

As businesses across America begin to reopen in the wake of the coronavirus (COVID-19) pandemic, many will likely implement new social distancing and sanitization procedures. That got us thinking about how companies may...more

Contract Corner: Drafting a Force Majeure Clause in the COVID-19 Era

The conditions created by the coronavirus (COVID-19) pandemic and resulting government shutdown orders have raised questions across various industries regarding contractual rights and obligations during the crisis. One...more

51 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide