News & Analysis as of

Information Technology Today's Popular Updates Technology Sector

Morgan Lewis - Tech & Sourcing

Global Capability Centers: The Next Gen of Delivery Models

2025 has seen a notable push by companies to establish dedicated capability centers—or global capability centers (GCCs)—in countries with lower-cost resources and access to a strong talent pool. According to S&S Insider, the...more

Robinson+Cole Data Privacy + Security Insider

Three States Ban DeepSeek Use on State Devices and Networks

New York, Texas, and Virginia are the first states to ban DeepSeek, the Chinese-owned generative artificial intelligence (AI) application, on state-owned devices and networks....more

Wiley Rein LLP

Continued Remote Hiring Concerns in IT Sector: What to Look for in 2025 and How to Mitigate Business Risk

Wiley Rein LLP on

Remote worker fraud is expected to continue to proliferate in 2025. Fully remote hiring and work, particularly in the technology sector, continues to pose unique business and legal risks for companies. Just in December 2024,...more

Fox Rothschild LLP

Treasury Revises Proposed Limits on China Tech Investments

Fox Rothschild LLP on

Revised regulations restricting investments in Chinese companies developing semiconductors and microelectronics, quantum information technologies, and artificial intelligence systems are taking shape and could soon be in...more

Health Care Compliance Association (HCCA)

Privacy Briefs: May 2024

Kaiser Permanente is notifying 13.4 million current and former members that their personal information may have been compromised when it was transmitted to tech giants Google, Microsoft Bing and X (formerly Twitter) when...more

Health Care Compliance Association (HCCA)

Behavioral health, artificial intelligence, and compliance

Technology’s exponential development and use in healthcare provides potentially significant benefits for behavioral health patients but also raises ethical and compliance concerns. The most recent technological advance...more

Fox Rothschild LLP

Biden Restricts Outbound Technology Investments into China

Fox Rothschild LLP on

A recent executive order issued by President Biden aims to prohibit or oversee investments in certain sensitive technologies that could threaten the national security of the United States. The executive order, which was...more

Mayer Brown

Cybersecurity Risks in Technology Transactions

Mayer Brown on

Engaging third-party providers for technology transactions involves a certain level of cybersecurity risk. In fact, most companies have been through a third-party incident. In this episode, partners Justin Herring and Adam...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 9, September 2023

Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more

Skadden, Arps, Slate, Meagher & Flom LLP

AI in Europe: Road Map for Navigating the IP, Data Protection and Regulatory Considerations

Organizations developing or using generative AI tools should implement cross-functional governance frameworks to develop and continuously monitor their use of such tools. From the earliest stages of generative AI use,...more

Foley Hoag LLP - Global Business and Human...

A Human Rights Impact Assessment of Microsoft's Enterprise Cloud and AI Technologies Licensed to U.S. Law Enforcement Agencies

Microsoft is one of the world’s leading technology companies. Its products and technologies are in offices, classrooms, and homes. Additionally, governments use them to help conduct vital public services. Microsoft is also...more

Wilson Sonsini Goodrich & Rosati

European Commission Proposes New EU Cybersecurity Rules for Software and Hardware Products

On September 15, 2022, the European Commission (EC) published a Proposal for a Cyber Resilience Act (CRA Proposal) that sets out new rules in the European Union (EU) for software and hardware products and their remote data...more

Snell & Wilmer

Adjusting to Construction in the Smart Home Technology Age

Snell & Wilmer on

Over the years, smart home technology has improved, expanded, and become more reasonably priced. As a result, homeowners are increasingly including it in their construction plans. While the conveniences of smart home...more

Amundsen Davis LLC

Top 5 Cyber Security Threats the Manufacturing Industry Should Watch in 2022

Amundsen Davis LLC on

Companies continue to see headlines about cyberattacks, but manufacturing companies, specifically, have become more targeted in the last few years. In the most recent issue of The Illinois Manufacturer, Molly Arranz and Sofia...more

Wiley Rein LLP

Cleared Defense Contractors at Risk from Russian Cyber Activity; Advisory Shows Government Expectations

Wiley Rein LLP on

What: Cleared Defense Contractors (CDCs) are being actively targeted by Russian state-sponsored cyber activity, according to a Joint Cybersecurity Advisory from the Federal Bureau of Investigation (FBI), National Security...more

K2 Integrity

Cyber Predictions 2022

K2 Integrity on

Where We Stand - This year kicks off against the backdrop of the security flaw found in Log4j, a system-logging code library widely used in applications and services across the Internet. In the aftermath of this crisis, a...more

Levenfeld Pearlstein, LLC

How to Address Cybersecurity Risks In A Private Placement Memorandum

The Securities and Exchange Commission (the “SEC”) requires companies to disclose the most significant factors that make investments in the company speculative or risky. Private Placement Memorandums (“PPMs”) are often used...more

Husch Blackwell LLP

Commerce Publishes Interim Final Rule Addressing “Foreign Adversaries” In ICTS Supply Chain

Husch Blackwell LLP on

On January 19, 2021, the U.S. Department of Commerce (Commerce) published a long-awaited interim final rule to address the use of goods or services sourced from “foreign adversaries” in the U.S. supply chain for information...more

Husch Blackwell LLP

Congress Passes The Internet Of Things (IoT) Cybersecurity Improvement Act

Husch Blackwell LLP on

On December 4, 2020 the President signed into law the IoT Cybersecurity Improvement Act of 2020, Pub. L. No. 116-207 (the “IoT Act”). The legislative purpose behind the new law is to ensure the highest level of cybersecurity...more

Holland & Knight LLP

Significant Changes to Supply Chain Compliance

Holland & Knight LLP on

This is the fifth blog post in a series analyzing the 2019 National Defense Authorization Act (NDAA) as signed into law on Aug. 13, 2018. Stay tuned for more blog posts covering additional topics in the near future from...more

Fisher Phillips

Don’t Take the Bait! “Spear Phishing” and “Whaling” Take Scams to the Next Level

Fisher Phillips on

For several years now, we’ve been alerting employers about the dangers of phishing scams that attempt to obtain private and personal information from employers... Many of these scams rear their ugly head around tax season,...more

Proskauer - Blockchain and the Law

Blockchain and Quantum Computing

2018 promises great inroads in the realm of “quantum computing.” While conventional computers use binary data or bits (i.e., 0s and 1s) to store and process information (a bit can either store a 0 or 1), a quantum computer...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - October 2017 #4

Robinson & Cole LLP on

Energy and Critical Infrastructure Industries Warned of Increased Attacks by FBI and DHS - The FBI and Department of Homeland Security issued a joint statement on October 20, 2017 warning of an increased danger of a...more

Baker Donelson

Recent Government Cyber Alert and Draft Guide for Financial Institutions: Lessons for All Organizations

Baker Donelson on

All organizations, including financial institutions, continue to face significant security threats across their wide ranging IT systems. Such organizations are particularly vulnerable if they cannot track networked devices...more

24 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide