News & Analysis as of

Privacy Science, Computers & Technology Intellectual Property

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:

In Wake of Equifax Breach, Squatters Appear and Are Vanquished

On September 7, Equifax Inc. announced the cyber security breach that could potentially impact 100 million U.S. consumers. In addition to Equifax’s main website, Equifax.com, the company set up a dedicated website —...more

Informing Illinois Newsletter - November 2017

by Hinshaw & Culbertson LLP on

When Records Are Not Reasonably Accessible - The Illinois Freedom of Information Act (FOIA) was amended in December, 2014 to provide that a public body is not required to copy a public record that is published on the...more

Bay Area Conference Sheds Light on Emerging Cyber Insurance Considerations

On October 11, 2017, the National Association of Insurance Commissioners and the Stanford Cyber Initiative held a joint conference on various topics related to cyber insurance. Below are key takeaways and hot topics discussed...more

Self-Driving Cars Spurred by Convergence of Traditional Manufacturers and Tech Companies, Foley Survey Finds

by Foley & Lardner LLP on

The race to self-driving cars has created new challenges and opportunities for companies, particularly automotive original equipment manufacturers that are facing competition from non-traditional sources in the technology...more

Keys to the Kingdom: How Confidentiality Agreements Are Key to Keeping Business Information Secret

by Payne & Fears on

In today’s business environment, greater employee mobility and technological advances underscore the need to protect a company’s confidential information and trade secrets. Stories of employees departing with confidential...more

Amazon’s Scanning Technology for Package Delivery

If you haven’t yet heard about it, Amazon is on the forefront of package delivery. And if you think that is old news (which it is!), have you heard about Amazon’s scanning technology capable of scanning the homes down below...more

Two End-of-Year Federal Government Deadlines Approaching

by McNair Law Firm, P.A. on

Significant Changes to Online Copyright (DMCA) Safe Harbor and DoD Contractor Cybersecurity (NIST 800-171) Requirements Take Effect at the End of This Year. Important Change Affecting Digital Millennium Copyright Act...more

Business Litigation E-Note - September 2017

by Burr & Forman on

Cyber threats take many forms. The widespread WannaCry ransomware attack in May of 2017 highlighted how computer files could be held hostage in return for payment, while the Dyn denial of service in October of 2016...more

Will the EU box itself in? Fate of Standard Contractual Clauses (aka the Model Clauses) for personal data transfers is now in the...

Executive summary: The EU’s standard contractual clauses may be on the fast track to invalidation, putting a vast number of personal data transfers from the EEA at risk. A case brought by Maximilian Schrems (whose first...more

EU General Data Protection Regulation

by Locke Lord LLP on

The EU’s General Data Protection Regulation (679/2016/EU), the GDPR, comes into force across the EU on 25 May 2018. As it is being made by Regulation the GDPR, unlike the existing Data Protection Directive (implemented into...more

Building a Health App? What You Need to Know

Last week, Apple announced the new Apple Watch Series 3 which will feature an enhanced heart rate app. The app will notify you when it detects an elevated heart rate even when you are not working out. The sensor will also be...more

Connecting the Dots: Key Developments and Best Practices for Evaluating Privacy and Security Risks in IoT Investments

by Shearman & Sterling LLP on

The market for internet-connected devices (often referred to as the Internet of Things, or IoT) is growing rapidly. Investment in this burgeoning space can be attractive, and according to research firm IDC, the worldwide...more

File Share Platforms and Business Risk

by Seyfarth Shaw LLP on

The use of open file sharing platforms in business continues to increase in 2017; Dropbox alone has over 200,000 active business accounts. Unfortunately, the convenience of these platforms and the increase in use by...more

Corporate E-Note - July 2017

by Burr & Forman on

Cyber threats take many forms. The widespread WannaCry ransomware attack in May of 2017 highlighted how computer files could be held hostage in return for payment, while the Dyn denial of service in October of 2016...more

Intellectual Property Bulletin - Summer 2017

by Fenwick & West LLP on

Reducing Cybersecurity Risks to Autonomous Vehicles - The Department of Transportation is revising autonomous vehicle guidelines it issued in September 2016. Recent comments by Secretary Elaine Chao suggest that the new...more

Advertising Law - July 2017 #4

‘World’s Best’ Is Puffery, Not Objectively Provable Claim - The claim “World’s Best Glass Cleaner” is puffery, the National Advertising Division decided in a challenge brought by S. C. Johnson & Son Inc. against advertiser...more

Labor & Employment E-Note - July 2017

by Burr & Forman on

Employers who have been anxiously awaiting an answer as to whether the Department of Labor (“DOL”) will continue to defend the Obama Administration’s controversial overtime rule that was temporarily blocked by a federal court...more

EU Regulation on Cross-Border Portability of Online Content Services in Force

by Reed Smith on

After publication in the Official Journal of the European Union, Regulation (EU) 2017/1128 of the European Parliament and of the Council of 14 June 2017 on cross-border portability of online content services in the internal...more

Conviction for Economic Espionage, Sale of Trade Secrets to China

by McDermott Will & Emery on

The US Court of Appeals for the Ninth Circuit upheld the first federal jury criminal conviction for economic espionage and theft of trade secrets under the Economic Espionage Act of 1996 (EEA), even though the owner of the...more

China's State Secret Laws: Five Unique Risks for Working With SOEs

by Kobre & Kim on

Despite opening its borders, the Chinese state still controls certain industries through majority or sole ownership. To participate in these industries, multinational companies must often set up equity or contractual joint...more

Draft Guidelines Released for Securing Cross-Border Data Transfers Out of China

by Faegre Baker Daniels on

With the Cybersecurity Law of China effective on June 1, 2017, and the draft data transmission measures pending finalization, Chinese regulators on May 27, 2017, published another draft rule as a piece of the newly formed...more

Videocast: Connected and Automated Cars: The Federal Government Addresses Cybersecurity and Data Privacy

Connected and automated vehicles are being built with components that enable them to not only access information, but also collect, store and transmit data for performance and safety purposes as well. Furthermore, these...more

Above the Clouds: Jeweler’s Trade Secret Spat Highlights Risk of Employee-Controlled Cloud Storage

We have discussed before the importance of maintaining internal policies and procedures to protect the security and integrity of cloud-based repositories. A recent case in the U.S. District Court for the District of Maryland...more

The Age of Competition - The Supreme Court Decides the First BPCIA Case

by King & Spalding on

In a landmark ruling for the biotech and pharmaceutical industries, a unanimous Supreme Court decided Sandoz Inc. v. Amgen Inc., 582 U.S. ____, Nos. 15-1039, 15-1195 (June 12, 2017), its first biosimilar case governed by the...more

Advertising Law - June 2017

Recipients of FTC Influencer Letters Revealed - The Federal Trade Commission took on some big-name celebrities and companies when it sent warning letters to influencers and marketers about the need to comply with the...more

344 Results
|
View per page
Page: of 14
Cybersecurity

Follow Privacy Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.