Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the week of June 17-23. Here’s what’s...more
On March 18, the USPTO issued a guidance document on how to examine claims that recite functional limitations without necessarily using the term “means” under 35 U.S.C. § 112. The guidance document aims to improve clarity,...more
Melissa Duffy and Trevor Coval contributed their thought leadership to the American Conference Institute’s 14th Annual Global Encryption, Cloud & Cyber Export Controls Conference, held in San Francisco on May 14-16. Melissa...more
Editor’s Note: In this insightful discussion between John Wilson, Chief Information Security Officer and President of Forensics at HaystackID, and Rene Novoa, Director of Forensics at HaystackID, we delve into the intricate...more
As supply chains have become more digitized and interconnected, they have also become more vulnerable to a range of cyber threats. These threats not only pose risks to the direct operations of companies but also to the...more
The Internet of Things (“IoT”) has ushered in a new era of connectivity and convenience, but with it comes a host of legal issues and emerging theories of liability. As IoT devices become increasingly ubiquitous in our daily...more
Understanding how hardware and firmware/software work together to perform desired functions or tasks is an important enabler to unlocking the value of intellectual properties in the systems (including embedded systems) area....more
This is a reminder that annual self-classification reports and semi-annual reports for hardware, software, or technology utilizing encryption ("Encryption Items") were due to be filed by February 1, 2024, with the Bureau of...more
As a follow-up to our previous article and webinar, “Are Automakers Making Sufficient Efforts to Protect Customer Data?”, we are addressing the recent 9th Circuit decision in Jones v. Ford Motor Co. At issue in this matter...more
Malicious Android Apps Used to Target Iranian Banks - An ongoing Android malware campaign targeting users of Iranian financial institutions has expanded to include new abilities to target an even greater number of people...more
On October 19, 2023, the U.S. Food and Drug Administration (FDA) issued Guidance for Industry and FDA Staff titled Enforcement Policy for Non-Invasive Remote Monitoring Devices Used to Support Patient Monitoring (guidance)....more
5 Questions is a periodic feature produced by Cornerstone Research, which asks our professionals, senior advisors, or affiliated experts to answer five questions. We interview Mike DeCesaris, vice president of Cornerstone...more
In any merger or acquisition, the due diligence stage is one of the most critical steps. It allows the acquiring company to identify dealbreakers, assess risks, make informed decisions, negotiate effectively, ensure...more
As we previously discussed, earlier this year the National Institute of Standards and Technology (NIST) launched the Trustworthy and Responsible AI Resource Center. Included in the AI Resource Center is NIST’s AI Risk...more
With interest in Artificial intelligence (AI) soaring, we were curious to determine how well a very popular ‘generative AI’ tool, ChatGPT, could perform at identifying the leading causes of cybersecurity incidents experienced...more
Data is like the mail: it just keeps coming in, day after day. Storing and maintaining it is a never-ending process. Excess data can slow down operations, diminishing a law firm’s productivity, profitability, and public...more
The term “metaverse” first appeared in 1992 as an abstract concept in Neal Stephenson’s dystopian novel Snow Crash. Two decades later, the Metaverse has since evolved from a mere idea to a figment of everyday reality, as it...more
For the past three years Bloomberg Law has conducted surveys to understand the key trends in legal operations and legal technology. One of the prominent findings in the 2022 survey is the shifting priorities by which firms...more
On September 15, 2022, the European Commission published its Proposal for a Cyber Resilience Act (CRA) which sets out new requirements for hardware and software products in the EU. The CRA applies to hardware and...more
On September 15, 2022, the European Commission (EC) published a Proposal for a Cyber Resilience Act (CRA Proposal) that sets out new rules in the European Union (EU) for software and hardware products and their remote data...more
The much-anticipated Security Assessment Measures for Outbound Data Transfers (hereinafter referred to as "the Measures") of China has already come into effect on September 1, 2022, and on the eve of the effective date, the...more
On 15 September 2022, the European Commission published its proposal for a new Cyber Resilience Act (the Act) that introduces common cybersecurity rules for placing products with digital elements on the EU market. ...more
On February 22, 2022, U.S. Department of Homeland Security Secretary Alejandro Mayorkas warned critical infrastructure organizations located in the United States of possible cyberattacks by Russian state-sponsored actors in...more
The U.S. Food & Drug Administration (FDA) recently issued draft guidance regarding the use of digital health technology (DHT) for the remote acquisition of clinical trial data. DHT can take the form of hardware and...more
The Cybersecurity and Infrastructure Security Agency (CISA) recently issued a Binding Operational Directive requiring all federal agencies to apply patches to new and old vulnerabilities that are being exploited in the wild....more