News & Analysis as of

Science, Computers & Technology Business Organization Consumer Protection

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:

Regulatory Changes Ahead: The 2018 Landscape for Technology Businesses in Europe

by Morrison & Foerster LLP on

Summary - The European Union has published its 2018 Work Programme which sets out a challenging agenda of legislative and regulatory change for the technology, media and telecoms (TMT) sectors, to be delivered in...more

SEC Enforcement Division Announces its 2018 Priorities and 2017 Results

The Securities and Exchange Commission’s Division of Enforcement (the “Division”) has published its annual report for fiscal year 2017 (the “Report”). The Report discusses the Division’s key initiatives and results in 2017...more

The Data Report Episode 26: The Internet of Things for Business

by Bilzin Sumberg on

Module Seven: The Internet of Things (Part III) In this episode of The Data Report, Litigation attorney Jay Ward discusses what the Internet of Things means for businesses. He speaks about how companies can incorporate and...more

Wrapping Your Privacy Practices Up with a Bow

by Ward and Smith, P.A. on

For many companies, the "hap-happiest season of all" coincides with the busiest season of all. Business owners and employees are racing to fill customer orders in time for the holidays, which also means an avalanche of new...more

DHS Amplifies Call for Public-Private Partnership in Cyberdefense and Pledges to “Intervene Directly”

The worldwide WannaCry attack from May 2017 has been officially blamed on North Korea. In a press briefing publicly announcing the Administration’s declaration of North Korean culpability, the Department of Homeland Security...more

The Data Report Episode 25: Cybersecurity & Networked Devices

by Bilzin Sumberg on

Module Seven: The Internet of Things (Part II) In part two of the "Internet of Things," Litigation attorney Jay Ward explores how a single compromised device can threaten a system of devices interconnected via the internet....more

Mine, Yours, and Ours: Gating Issues in the Use and Commercialization of Data

by Morgan Lewis on

Many companies are actively exploring how to better use, commercialize, and productize (make into a standalone product) the data that they collect or is collected on their behalf. A gating issue for these companies is...more

Is Your Company Ready For Artificial Intelligence?

by Morrison & Foerster LLP on

“The rise of powerful AI will be either the best or the worst thing ever to happen to humanity. We do not know which.” –Stephen Hawking Artificial Intelligence (AI) and autonomous technology will shape the future, affect...more

Banks Find Success Suing Over Data Breaches

Banks continue to file suit against retailers, hoping to shift the costs of data breaches, with some recent success. What happened - In January 2016, hackers accessed Eddie Bauer’s point-of-sale register system and...more

The Government’s Role in Promoting and Leading Effective Cybersecurity

by Morgan Lewis on

Introduction - Data breaches have the power to inflict significant damage and consequences with the potential to bring a company, industry or government agency to its knees, or adversely harm those individuals whose...more

The New EU Privacy Law, General Data Protection Regulation — What A Non-EU Company Should Know

by Cozen O'Connor on

The new European privacy law, General Data Protection Regulation (GDPR), was approved by the European Union (EU) Parliament to replace its predecessor Data Protection Directive 95/46/EC (Directive). GDPR will be enforceable...more

Does Your Website Comply With the ADA? Does It Even Need To? Webinar Q&A Document

by Pepper Hamilton LLP on

On Tuesday, November 14, 2017, Pepper attorneys Charles S. Marion, Jeffrey M. Goldman and Tracey E. Diamond spoke on a webinar to explore whether the ADA applies to websites, analyze trends and review recent decisions in...more

Defining the GDPR’s Data Protection Officer Requirement

by NAVEX Global on

The European Union’s sweeping new General Data Protection Regulation goes into effect six months from now. Most ethics and compliance officers in the United States already know that, and most are responding with some degree...more

The Data Report: Data Security Tips This Holiday Season

by Bilzin Sumberg on

In a special edition of The Data Report, Litigation attorney Jay Ward discusses items to bear in mind during the biggest spending season of the year. Jay's holiday data security tips include taking regular inventory of your...more

Make Your Online Terms of Service "Uber" Enforceable

by Partridge Snow & Hahn LLP on

Are your online Terms of Service enforceable? Businesses should review their account registration process in light of a recent court decision. In Meyer v. Uber Technologies, Inc., the U.S. Court of Appeals for the Second...more

Artificial Intelligence: Expectations of the IT Department

by Morgan Lewis on

Artificial intelligence (AI) is the hot topic on everyone’s mind. Technology providers are researching and developing how they can exploit AI, companies in a wide range of industries are seeking to understand how AI will...more

Proposed CFIUS Overhaul Focuses on Cybersecurity and High-Tech Sectors

by Morrison & Foerster LLP on

Recently proposed legislation would substantially overhaul current law governing the Committee on Foreign Investment in the United States (CFIUS) by dramatically expanding CFIUS’ authorities and calling for CFIUS to take...more

To Scan or Not to Scan: Surge in Lawsuits under Illinois Biometrics Law

by McDermott Will & Emery on

The Illinois Biometric Information Privacy Act is having its moment. At least 32 class action lawsuits have been filed by Illinois residents in state court in the past two months challenging the collection, use and storage of...more

FTC: Stay Stuck on Security

The Federal Trade Commission recently wrapped up its Stick with Security blog series, which dove deeply into data security lessons based on agency cases, closed investigations, and questions and comments from businesses....more

When It Comes to Perception of Third-Party Risks, Cyber Security Tops Corruption

by NAVEX Global on

Compliance professionals face a daunting task when it comes to managing their third parties. Particularly for global companies, the challenges of mitigating these risks without suffering legal, financial or reputational harm...more

Avoid the Headlines: Six Initial Steps To Take Today To Improve Your Company's Data Security

Unless you have been living under a rock, you are probably aware that companies are suffering cyber attacks that jeopardize sensitive company or customer data more and more frequently. What you may not know is that even more...more

FTC Sticks With Keeping Security Current, Physical Media Safe

In the latest blog posts in the Federal Trade Commission’s “Stick with Security” series, the FTC focused on the procedures companies should put in place that will keep their security current, will address vulnerabilities that...more

Is Your Business Insured Against A Cyber Attack?

by Partridge Snow & Hahn LLP on

Your business has insurance coverage for flood and fire damage. You are protected if an employee gets into a car accident. But are you covered for a cyber attack?...more

Proposition 65 Legislative Changes Likely “Lack Merit”

by Morrison & Foerster LLP on

On October 5, 2017, California Governor Jerry Brown signed Assembly Bill 1583 into law. It was promoted as a means of reducing frivolous Proposition 65 (Prop 65) lawsuits, but, as discussed below, it is doubtful that it will...more

NIST Small Business Cybersecurity Act Passes in the House

by Morgan Lewis on

On October 11, 2017, the House of Representatives passed bill H.R. 2105, the NIST Small Business Cybersecurity Act (NIST Act), which would require the US Department of Commerce’s National Institute of Standards and Technology...more

174 Results
|
View per page
Page: of 7
Cybersecurity

Follow Science, Computers & Technology Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.