News & Analysis as of

Data Security Technology Sector Privacy Concerns

Sheppard Mullin Richter & Hampton LLP

Cybersecurity Labeling Program to Increase Transparency of IoT Device Security

In response to a constantly-evolving cyber threat landscape, the Biden Administration recently announced the launch of a new cybersecurity labeling program – the U.S. Cyber Trust Mark program – in an effort to enhance...more

Womble Bond Dickinson

Will NeuralHash Make a Hash of Privacy?

Womble Bond Dickinson on

Our personal technology is so complex that making a change in one aspect is likely to affect us in many ways. When tech companies step into social issues, we are likely to see unintended consequences....more

Foley Hoag LLP - Security, Privacy and the...

MaHIMA Webinar: "Alexa, What Medication Am I Taking?" (Presentation)

"Open the pod door, HAL" • Commercial voice-activated intelligent personal assistants from Amazon, Apple, Google, and Microsoft, among others, are growing in popularity. • A report from NPR and Edison Research states...more

Bradley Arant Boult Cummings LLP

Technology at a Price: Risks With Using Biometric Scanning in the Workplace - Labor & Employment Newsletter

Parents who took their children to Disney World in recent years may have been surprised when Disney “cast members” asked the young princes and princesses to place a finger on a scanner before entering the parks. Biometric...more

Morgan Lewis

Artificial Intelligence: Expectations of the IT Department

Morgan Lewis on

Artificial intelligence (AI) is the hot topic on everyone’s mind. Technology providers are researching and developing how they can exploit AI, companies in a wide range of industries are seeking to understand how AI will...more

Proskauer - New Media & Technology

A Host of Biometric Privacy/Facial Recognition Bills Currently Circulating in State Legislatures

We’ve written extensively about the numerous lawsuits, dismissals and settlements surrounding the Illinois Biometric Information Privacy Act (BIPA). The statute, generally speaking, prohibits an entity from collecting,...more

BakerHostetler

Colleges and Universities Are Prime Cyberattack Targets: What’s Behind the Threat?

BakerHostetler on

When it comes to cyberattack targets, many think of retailers and associated credit card transactions or customer information, or perhaps healthcare providers with their ever-increasing storage and transmission of electronic...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide