News & Analysis as of

Hardware Software

Array

This Week in eDiscovery: Preserving Native Document Formats, Sanctions for Failing to Preserve Texts, and More

Array on

Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the week of June 17-23. Here’s what’s...more

Fitch, Even, Tabin & Flannery LLP

IP Alert: USPTO Issues Guidance for Examining Means-Plus-Function and Step-Plus-Function Claim Limitations

On March 18, the USPTO issued a guidance document on how to examine claims that recite functional limitations without necessarily using the term “means” under 35 U.S.C. § 112. The guidance document aims to improve clarity,...more

Fenwick & West LLP

Latest Updates in Trade Controls for the Tech Sector

Fenwick & West LLP on

Melissa Duffy and Trevor Coval contributed their thought leadership to the American Conference Institute’s 14th Annual Global Encryption, Cloud & Cyber Export Controls Conference, held in San Francisco on May 14-16. Melissa...more

HaystackID

[Webcast Transcript] Solve the Digital Puzzle: Your Guide to Navigating Mobile Forensics’ Future

HaystackID on

Editor’s Note: In this insightful discussion between John Wilson, Chief Information Security Officer and President of Forensics at HaystackID, and Rene Novoa, Director of Forensics at HaystackID, we delve into the intricate...more

Foley & Lardner LLP

Combatting Supply Chain Cyber Threats: Safeguarding Data and Protecting Digital Supply Chains

Foley & Lardner LLP on

As supply chains have become more digitized and interconnected, they have also become more vulnerable to a range of cyber threats. These threats not only pose risks to the direct operations of companies but also to the...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Emerging Theories of Liability in the Internet of Things Era

The Internet of Things (“IoT”) has ushered in a new era of connectivity and convenience, but with it comes a host of legal issues and emerging theories of liability. As IoT devices become increasingly ubiquitous in our daily...more

J.S. Held

Software and Firmware Reverse Engineering & Testing

J.S. Held on

Understanding how hardware and firmware/software work together to perform desired functions or tasks is an important enabler to unlocking the value of intellectual properties in the systems (including embedded systems) area....more

Davis Wright Tremaine LLP

Reminder: Have You Filed Your Encryption Self-Classification Reports with the Bureau of Industry and Security?

This is a reminder that annual self-classification reports and semi-annual reports for hardware, software, or technology utilizing encryption ("Encryption Items") were due to be filed by February 1, 2024, with the Bureau of...more

Spilman Thomas & Battle, PLLC

Revisiting…Are Automakers Making Sufficient Efforts to Protect Customer Data?

As a follow-up to our previous article and webinar, “Are Automakers Making Sufficient Efforts to Protect Customer Data?”, we are addressing the recent 9th Circuit decision in Jones v. Ford Motor Co. At issue in this matter...more

Ankura

Ankura CTIX FLASH Update - December 2023

Ankura on

Malicious Android Apps Used to Target Iranian Banks - An ongoing Android malware campaign targeting users of Iranian financial institutions has expanded to include new abilities to target an even greater number of people...more

Foley & Lardner LLP

FDA’s New Enforcement Policy: A Win for Remote Patient Monitoring and Remote Therapeutic Monitoring Manufacturers

Foley & Lardner LLP on

On October 19, 2023, the U.S. Food and Drug Administration (FDA) issued Guidance for Industry and FDA Staff titled Enforcement Policy for Non-Invasive Remote Monitoring Devices Used to Support Patient Monitoring (guidance)....more

Cornerstone Research

5 Questions with Mike DeCesaris: AI/ML Efficiency Driven by GPUs

Cornerstone Research on

5 Questions is a periodic feature produced by Cornerstone Research, which asks our professionals, senior advisors, or affiliated experts to answer five questions. We interview Mike DeCesaris, vice president of Cornerstone...more

Foley & Lardner LLP

The Importance of Due Diligence in M&A Transactions

Foley & Lardner LLP on

In any merger or acquisition, the due diligence stage is one of the most critical steps. It allows the acquiring company to identify dealbreakers, assess risks, make informed decisions, negotiate effectively, ensure...more

Foley & Lardner LLP

NIST’s AI Risk Management Framework Helps Businesses Address AI Risk

Foley & Lardner LLP on

As we previously discussed, earlier this year the National Institute of Standards and Technology (NIST) launched the Trustworthy and Responsible AI Resource Center. Included in the AI Resource Center is NIST’s AI Risk...more

Ankura

When it Comes to Cybersecurity, ChatGPT Needs to Go Back to School

Ankura on

With interest in Artificial intelligence (AI) soaring, we were curious to determine how well a very popular ‘generative AI’ tool, ChatGPT, could perform at identifying the leading causes of cybersecurity incidents experienced...more

Reveal

A Guide to Efficient Data Remediation for Law Firms in 2023

Reveal on

Data is like the mail: it just keeps coming in, day after day. Storing and maintaining it is a never-ending process. Excess data can slow down operations, diminishing a law firm’s productivity, profitability, and public...more

Shipkevich PLLC

Metaverse Primer

Shipkevich PLLC on

The term “metaverse” first appeared in 1992 as an abstract concept in Neal Stephenson’s dystopian novel Snow Crash. Two decades later, the Metaverse has since evolved from a mere idea to a figment of everyday reality, as it...more

Array

How do you evaluate your tech partnerships?

Array on

For the past three years Bloomberg Law has conducted surveys to understand the key trends in legal operations and legal technology. One of the prominent findings in the 2022 survey is the shifting priorities by which firms...more

Polsinelli

EU Cyber Resilience Act

Polsinelli on

On September 15, 2022, the European Commission published its Proposal for a Cyber Resilience Act (CRA) which sets out new requirements for hardware and software products in the EU.  The CRA applies to hardware and...more

Wilson Sonsini Goodrich & Rosati

European Commission Proposes New EU Cybersecurity Rules for Software and Hardware Products

On September 15, 2022, the European Commission (EC) published a Proposal for a Cyber Resilience Act (CRA Proposal) that sets out new rules in the European Union (EU) for software and hardware products and their remote data...more

Linda Liu & Partners

China’s Security Assessment Measures for Outbound Data Transfers and Understanding on the Application Guidelines

Linda Liu & Partners on

The much-anticipated Security Assessment Measures for Outbound Data Transfers (hereinafter referred to as "the Measures") of China has already come into effect on September 1, 2022, and on the eve of the effective date, the...more

A&O Shearman

EU – New Cyber Resilience Act will provide cybersecurity requirements for hardware and software products

A&O Shearman on

On 15 September 2022, the European Commission published its proposal for a new Cyber Resilience Act (the Act) that introduces common cybersecurity rules for placing products with digital elements on the EU market. ...more

Foley & Lardner LLP

Security Measures to Deploy Now to Defend Against a Russian Cyberattack

Foley & Lardner LLP on

On February 22, 2022, U.S. Department of Homeland Security Secretary Alejandro Mayorkas warned critical infrastructure organizations located in the United States of possible cyberattacks by Russian state-sponsored actors in...more

Foley & Lardner LLP

FDA Addresses the Role of Digital Health Technology in Clinical Trials

Foley & Lardner LLP on

The U.S. Food & Drug Administration (FDA) recently issued draft guidance regarding the use of digital health technology (DHT) for the remote acquisition of clinical trial data. DHT can take the form of hardware and...more

Robinson+Cole Data Privacy + Security Insider

CISA Issues Binding Operational Directive on Patching Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) recently issued a Binding Operational Directive requiring all federal agencies to apply patches to new and old vulnerabilities that are being exploited in the wild....more

30 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide