News & Analysis as of

Data Protection Internet of Things

Seyfarth Shaw LLP

Careful Data Governance Is a Must Amid Enforcement Focus

Seyfarth Shaw LLP on

Corporations face unprecedented challenges in safeguarding sensitive data and mitigating privacy risks in an era marked by the rapid proliferation of Internet of Things, or IoT, devices....more

J.S. Held

Benefits of a vCISO in the Age of AI-Driven Cyberattacks

J.S. Held on

Cyberattacks powered by artificial intelligence have become more sophisticated as bad actors utilize machine learning to analyze vulnerabilities, automate exploits, and outpace traditional security measures. Through the use...more

Bradley Arant Boult Cummings LLP

Avoiding growing pains in the development and use of digital twins

Novel technologies that seek to improve quality of life or simplify complex processes offer great promise. For example, medical technologies that detect or cure disease or supply chain technologies that allow for real time...more

Butler Snow LLP

A New Look at an Old Hot Topic: The Internet of Things

Butler Snow LLP on

In 1999, computer scientist Kevin Ashton coined the term “the Internet of Things” (“IoT”) in order to put a name to his idea of using RFID chips to track items as they moved throughout a supply chain. “Though there is no...more

Clark Hill PLC

Right To Know - June 2024, Vol. 18

Clark Hill PLC on

Cyber, Privacy, and Technology Report - Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed....more

Mitchell, Williams, Selig, Gates & Woodyard,...

Emerging Theories of Liability in the Internet of Things Era

The Internet of Things (“IoT”) has ushered in a new era of connectivity and convenience, but with it comes a host of legal issues and emerging theories of liability. As IoT devices become increasingly ubiquitous in our daily...more

Health Care Compliance Association (HCCA)

Privacy Briefs: February 2024

The American Hospital Association (AHA) has warned that information technology (IT) help desks are being targeted in a social engineering scheme that uses the stolen identity of revenue cycle employees or employees in other...more

Spilman Thomas & Battle, PLLC

Are Automakers Making Sufficient Efforts to Protect Customer Data?

With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National Highway Traffic Safety Administration (“NHTSA”) has broad regulatory...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 9, September 2023

Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more

Wiley Rein LLP

Mobile World Congress 2023: Packed Agenda Promises Key Insights on Spectrum, IoT, Cybersecurity, and Wireless Industry Innovation

Wiley Rein LLP on

Next week in Las Vegas, the Mobile World Congress (MWC) will bring together policymakers, industry experts, and stakeholders across the wireless ecosystem to discuss critical issues impacting the industry. Hosted by trade...more

Venable LLP

What’s in a Label? FCC Begins Rulemaking Procedure for Cybersecurity Labeling on IoT Devices

Venable LLP on

Cybersecurity and data protection is front and center on the Federal Communications Commission’s (FCC) agenda. The latest manifestation of this is the FCC’s issuance of a Notice of Proposed Rulemaking (NPRM) on August 25,...more

Carlton Fields

Colorado DOI Fast-Tracks Big Data Governance Rulemaking

Carlton Fields on

On August 31, 2023, the Colorado Division of Insurance will hold a virtual rulemaking hearing for its proposed regulation on governance and risk management framework requirements for life insurers using external consumer data...more

Latham & Watkins LLP

5 Things To Know About The European Data Act

Latham & Watkins LLP on

The European Parliament and the Council of the European Union adopted the European Data Act on June 28 after lengthy negotiations. The Data Act creates a legal framework for a single European data market, and its key...more

J.S. Held

Top 4 Cybersecurity Headaches Plaguing Financial Services Institutions

J.S. Held on

Most Financial Services Institutions (FSIs) have digital technology at their core. And a primary responsibility for most FSIs is “cyber-connect” customers – be they organizations or individuals – with their money simply and...more

Hogan Lovells

Security by design: incoming UK and EU legislation to tackle cybersecurity risks in IoT devices

Hogan Lovells on

In December 2022, the UK Product Security and Telecommunications Infrastructure Act (“PSTI Act”) became law. Along with setting out requirements for the deployment and expansion of mobile, full fibre and gigabit capable...more

Hogan Lovells

EU Data Act Series (part 3): medical and health devices and data sharing obligations

Hogan Lovells on

The Data Act Proposal envisages the rights of users of medical devices / health wearables to have access to and to share the data originated from the use of the device with third parties. These access and sharing rights are...more

Health Care Compliance Association (HCCA)

Report on Patient Privacy Volume 23, Number 1. Outlook 2023: Ransomware Threats Multiply as Rogue Nation-States Sponsor More...

Report on Patient Privacy Volume 23, no 1 (January 2023) Ransomware—including increased attacks from criminal groups affiliated with rogue nation-states such as Russia and North Korea—will continue to dominate the health...more

Fox Rothschild LLP

What Did the EDPS Have to Say About FTC Rulemaking on Commercial Surveillance?

Fox Rothschild LLP on

The European Data Protection Supervisor (EDPS) has submitted comments to FTC Rulemaking on commercial surveillance. Here are some key takeaways. IOT devices: •It is important that data from the Internet of Things are...more

Ankura

Malware, Spyware, and Ransomware: How They Differ and How to Respond

Ankura on

Malware is an umbrella term for all malicious software. What is malware? Malware is an umbrella term that includes all types of malicious software, including viruses, worms, Trojans, ransomware, and spyware. These...more

ArentFox Schiff

October 2022 AFS Privacy Report: California Privacy Protection Agency Releases Updated Draft Regulations Ahead of October 28-29...

ArentFox Schiff on

California Privacy Protection Agency Releases Revised Regulations - With the effective date less than three months away, and ahead of a Board Meeting on October 28 and 29, the California Privacy Protection Agency released...more

HaystackID

[Webcast Transcript] The State of US Privacy Law: What to Expect in 2023 and Beyond

HaystackID on

Editor’s Note: On September 29, 2022, HaystackID shared an educational webcast on the topic of US privacy law. As privacy continues to move to the forefront of not only information consideration but of business concern for...more

Blank Rome LLP

The BR Privacy & Security Download: October 2022

Blank Rome LLP on

Welcome to this month's issue of The BR Privacy & Security Download, the digital newsletter of Blank Rome’s Privacy, Security & Data Protection practice. ...more

Health Care Compliance Association (HCCA)

Report on Patient Privacy Volume 22, Number 9. Privacy Briefs: September 2022

Report on Patient Privacy 22, no. 9 (September, 2022) - More than 92% of patients believe privacy is a right and their health data should not be available for purchase, according to a survey from the American Medical...more

Spilman Thomas & Battle, PLLC

The PATCH Act: Protecting Medical Devices from Cyber Attacks

In a previous issue of Decoded, we discussed the alarming fact that many medical devices, including those implanted in patients' bodies, are leaving the manufacturers with known cybersecurity flaws. Due to these known flaws,...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights, Volume 3, Issue 5

The Cryptocurrency Revolution and President Biden's Formal Recognition - Out of the ashes of the 2008 financial crisis, Bitcoin sprang up like an insurgency, targeting both the unbridled activity of large financial...more

207 Results
 / 
View per page
Page: of 9

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide