In Part I, we discussed the European Commission’s (“Commission”) disapproval of Meta’s “pay or consent” subscription model. In Part II, we delve into the European Commission’s findings, prior findings by the European Data...more
7/29/2024
/ Consent ,
Corporate Counsel ,
Data Privacy ,
Data Protection ,
Data Security ,
EU ,
European Commission ,
European Data Protection Board (EDPB) ,
European Economic Area (EEA) ,
Investigations ,
Personal Data ,
Popular ,
Privacy Laws
A significant shift in cybersecurity compliance is on the horizon, and businesses need to prepare. Starting in 2024, organizations will face new requirements to report cybersecurity incidents and ransomware payments to the...more
6/3/2024
/ Covered Entities ,
Critical Infrastructure Sectors ,
Cyber Incident Reporting ,
Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) ,
Cybersecurity ,
Cybersecurity Information Sharing Act (CISA) ,
Department of Homeland Security (DHS) ,
Enforcement Actions ,
New Rules ,
NPRM ,
Popular ,
Ransomware ,
Reporting Requirements ,
Risk Management
Data security is a top concern for organizations in today’s digital landscape. It protects data from unauthorized access, use, modification, or disclosure, and requires implementing technical, administrative, and physical...more
11/30/2023
/ Compliance ,
Cyber Attacks ,
Cyber Incident Reporting ,
Cyber Threats ,
Cybersecurity ,
Data Mapping ,
Data Protection ,
Data Security ,
Enforcement ,
Incident Response Plans ,
Network Security ,
Popular ,
Risk Management
In a coordinated effort to counter Russia's aggression against Ukraine, the Export Enforcement Five (E5) — comprising Australia, Canada, New Zealand, the United Kingdom, and the United States — have released unprecedented...more
On Sept. 14, 2023, the U.S. government designated five Turkish companies for breaching U.S. sanctions against Russia. The designations should not have been a surprise, as Washington had been warning the Turkish government and...more
Machine learning (ML) models are a cornerstone of modern technology, allowing models to learn from and make predictions based on vast amounts of data. These models have become integral to various industries in an era of rapid...more
8/17/2023
/ Artificial Intelligence ,
California ,
California Consumer Privacy Act (CCPA) ,
California Privacy Rights Act (CPRA) ,
Cyber Attacks ,
Cybersecurity ,
Data Privacy ,
Machine Learning ,
Popular ,
Risk Factors ,
State Privacy Laws ,
Technology Sector
There is a great YouTube video that has been circulating the internet for half a decade that reimagines a heuristically programmed algorithmic computer “HAL-9000” as Amazon Alexa in an iconic scene from “2001: A Space...more
The adoption of predictive maintenance (PM), an artificial intelligence (AI) driven strategy that anticipates potential equipment failures using Internet of Things (IoT) sensors, holds immense promise for the construction...more
7/28/2023
/ Artificial Intelligence ,
Construction Industry ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Internet of Things ,
Liability ,
Popular ,
Risk Factors ,
Safety Standards ,
Technology
The construction sector is known for its perennial pursuit of efficiency, quality, and safety. In recent years, one of the tools the sector has started leveraging to achieve these goals is predictive maintenance (PM),...more
The construction industry’s rapid digital transformation has opened the door to new cybersecurity challenges. As the sector adopts innovative technologies like cyber-physical systems, Building Information Modeling (BIM), and...more
6/22/2023
/ Bids ,
Construction Industry ,
Cybersecurity ,
Data Breach ,
Department of Transportation (DOT) ,
Fraud ,
Intellectual Property Protection ,
Popular ,
Ransomware ,
Risk Management ,
Wire Transfers
In an era where our lives are ever more intertwined with technology, the security of digital platforms is a matter of national concern. A recent large-scale cyberattack affecting several U.S. federal agencies and numerous...more
6/19/2023
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Cybersecurity Information Sharing Act (CISA) ,
Data Breach ,
Data Transfers ,
Digital Platforms ,
International Data Transfers ,
National Security ,
Popular ,
Ransomware ,
Software ,
Technology Sector