The Rise of Internet of Things Security Laws – Part II

Blank Rome LLP
Contact

This is the second part of a two-part article examining the enactment of California’s Internet of Things (“IoT”) security law, and the wave of similar IoT laws expected to follow close behind in 2020. The first part of this article, which appeared in the June 2020 issue of Pratt’s Privacy & Cybersecurity Law Report, discussed the current legal landscape as it relates to the security of connected devices and took a closer look at California’s new IoT security law – which went into effect at the start of the year. This second part provides tips and strategies for IoT device manufacturers to comply with the IoT security regulations expected to begin to blanket the country.

In the blink of an eye, Internet of Things (“IoT”) technology – which connects household and consumer items to the internet – brought about advanced capabilities that were just years ago thought to be matters of science fiction. Notable examples include connected cars, smart homes, and wearable tech, just to name a few.

Originally published in the July/August 2020 edition of Pratt’s Privacy & Cybersecurity Law Report (Vol. 6, No. 6).

Please see full article below for more information.

LOADING PDF: If there are any problems, click here to download the file.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Blank Rome LLP | Attorney Advertising

Written by:

Blank Rome LLP
Contact
more
less

Blank Rome LLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.