Constangy Clips Ep. 10 - 3 Ways the GDPR Is Evolving with Today’s Tech Landscape
Guidepost in Motion EP26: Privacy Matters Part 1: Privacy vs. Convenience
No Password Required: A Senior Product Manager at GitLab With an Instagram Alter Ego That Puts Her in Privacy Superhero Territory
The Intersection of Technology, Regulatory Policy, and White Collar Defense
Kidon Podcast: War stories on the cutting edge of IP monetization – David Cohen and Eric Stasik
Regulating the Internet of Things
DoD Cyber: A Conversation with Melissa Vice, COO for DoD’s Vulnerability Disclosure Program
SEP Litigation and the Internet of Things no.2
SEP Litigation and the Internet of Things
An Update On IOT Device Breaches, Framework, And Legislation
Cybersecurity and Data Privacy Year in Review: Major Breaches, Changes in the Law, and Upcoming Trends
Jones Day Presents: Smart Contracts and Blockchain
Impact of the Internet of Things on the Insurance Industry
What’s Next?: Drones and transforming policy at GE
The Intersection of Wearable Technology and the Insurance Industry
Your Cyber Minute: Lessons learned from the automotive sector
Your Cyber Minute: Top threats for 2017
The Ever-Expanding Scope of Social Media Discovery
Last year we made some predictions about 2024’s cyber landscape and major issues. Several proved prescient, with incident reporting, CISO scrutiny, SEC aggression, and new regulation of various sectors taking shape as the...more
Despite the coming transition in agency leadership, the FCC’s Internet of Things (IoT) Cybersecurity Labeling Program (the IoT Program) hit some major milestones this month, as the agency pushes ahead with this novel program....more
President Ronald Reagan famously quipped, "I think you all know that I've always felt that the nine most terrifying words in the English language are: I'm from the Government, and I'm here to help."1 At an Oct. 23-24, 2024,...more
Corporations face unprecedented challenges in safeguarding sensitive data and mitigating privacy risks in an era marked by the rapid proliferation of Internet of Things, or IoT, devices....more
Cyberattacks powered by artificial intelligence have become more sophisticated as bad actors utilize machine learning to analyze vulnerabilities, automate exploits, and outpace traditional security measures. Through the use...more
In 1999, computer scientist Kevin Ashton coined the term “the Internet of Things” (“IoT”) in order to put a name to his idea of using RFID chips to track items as they moved throughout a supply chain. “Though there is no...more
Consistent with an announcement from the Biden-Harris administration in July 2023, the Federal Communications Commission (FCC) has released an order establishing the framework for the new US Cyber Trust Mark program. Under...more
The Federal Communications Commission (FCC) recently approved a voluntary Internet of Things (IoT) Labeling Program, which allows manufacturers of IoT products to earn the FCC’s approval to display a “U.S. Cyber Trust Mark”...more
The Federal Communications Commission (FCC) has created a baseline for wireless consumer IoT products to protect against cybersecurity threats. The voluntary program uses criteria established by the National Institute of...more
The Federal Communications Commission (FCC) unanimously approved a Report and Order (R&O) creating a new voluntary Cybersecurity Labeling Program for Internet of Things (IoT) products. It also released a Further Notice of...more
On February 22, 2024, the Federal Communications Commission (FCC or “Commission”) released a Public Draft of a Report and Order that, if adopted, would establish a voluntary labeling program for Internet of Things (IoT)...more
The American Hospital Association (AHA) has warned that information technology (IT) help desks are being targeted in a social engineering scheme that uses the stolen identity of revenue cycle employees or employees in other...more
The U.S. Department of Defense released a special holiday treat for government contractors and subcontractors last week in the form of long-promised proposed regulations for its Cybersecurity Maturity Model Certification...more
Last month the Federal Acquisition Regulatory (FAR) Council announced a major proposal regarding cybersecurity incident reporting and information. Comments currently are now due by February 2, 2024....more
In what can best be described as a tsunami of cybersecurity regulation, the Federal Acquisition Regulation (FAR) Council—consisting of the Department of Defense (DoD), General Services Administration (GSA), and National...more
Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more
In the hyper-connected era of smart manufacturing, accelerated by “Industry 4.0,” the manufacturing sector is undergoing a digital revolution. By leveraging technologies such as advanced automation, artificial intelligence,...more
As we explained in an August 2023 client alert, the US Cyber Trust Mark program will provide consumers with information about the relative security of an Internet of Things (IoT) device or product. The Federal Communications...more
The Federal Communications Commission (FCC) has published its notice of proposed rulemaking (the NPRM) detailing the proposed creation of a voluntary cybersecurity labeling program for Internet of Things (IoT) or "smart"...more
In a new Notice of Proposed Rulemaking (NPRM), the Federal Communications Commission (FCC) imposes a short comment deadline for a complex new cybersecurity labeling regime for Internet of Things (IoT) devices. The NPRM also...more
On July 18, 2023, the Biden Administration announced the launch of the long-awaited cybersecurity labeling program, called the “U.S. Cyber Trust Mark,” aimed at providing consumers with a better understanding of the...more
The adoption of predictive maintenance (PM), an artificial intelligence (AI) driven strategy that anticipates potential equipment failures using Internet of Things (IoT) sensors, holds immense promise for the construction...more
By next year, consumers may be able to scan a QR code on their connected devices for information about cybersecurity protections that are built into their devices. Details on the program are still being worked out, but the...more
In this second article in our three-part smart buildings series, we ask: is retrofitting an existing building worth it? Smart buildings utilise integrated technology systems to optimise energy usage and improve building...more
REITs are increasingly reliant on technologies across the spectrum of information technology and operating technology that range from cloud-based systems and the Internet of Things (IoT) to automated building management...more