Guidepost in Motion EP26: Privacy Matters Part 1: Privacy vs. Convenience
No Password Required: A Senior Product Manager at GitLab With an Instagram Alter Ego That Puts Her in Privacy Superhero Territory
The Intersection of Technology, Regulatory Policy, and White Collar Defense
Kidon Podcast: War stories on the cutting edge of IP monetization – David Cohen and Eric Stasik
Regulating the Internet of Things
DoD Cyber: A Conversation with Melissa Vice, COO for DoD’s Vulnerability Disclosure Program
SEP Litigation and the Internet of Things no.2
SEP Litigation and the Internet of Things
An Update On IOT Device Breaches, Framework, And Legislation
Cybersecurity and Data Privacy Year in Review: Major Breaches, Changes in the Law, and Upcoming Trends
Jones Day Presents: Smart Contracts and Blockchain
Impact of the Internet of Things on the Insurance Industry
What’s Next?: Drones and transforming policy at GE
The Intersection of Wearable Technology and the Insurance Industry
Your Cyber Minute: Lessons learned from the automotive sector
Your Cyber Minute: Top threats for 2017
The Ever-Expanding Scope of Social Media Discovery
FCC Welcomes Comment Regarding BIAS Providers’ Use of Data Caps for Fixed and Mobile Broadband Internet Service: In this Notice of Inquiry (NOI), the Federal Communications Commission (FCC or Commission) seeks comment...more
In 1999, computer scientist Kevin Ashton coined the term “the Internet of Things” (“IoT”) in order to put a name to his idea of using RFID chips to track items as they moved throughout a supply chain. “Though there is no...more
Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more
The FCC and House of Representatives have begun discussions on the safety and security of IoT modules from China. The FCC adopted a Notice of Proposed Rulemaking to create an Internet of Things (IoT) cybersecurity labeling...more
In response to a constantly-evolving cyber threat landscape, the Biden Administration recently announced the launch of a new cybersecurity labeling program – the U.S. Cyber Trust Mark program – in an effort to enhance...more
The adoption of predictive maintenance (PM), an artificial intelligence (AI) driven strategy that anticipates potential equipment failures using Internet of Things (IoT) sensors, holds immense promise for the construction...more
Editor’s Note: On September 29, 2022, HaystackID shared an educational webcast on the topic of US privacy law. As privacy continues to move to the forefront of not only information consideration but of business concern for...more
This week on “Regulatory Matters,” partner Doreen M. Edelman, chair of Lowenstein’s Global Trade & National Security group, interviews partner Kathleen A. McGee on her practice’s dual focus on White Collar Criminal Defense...more
The Cryptocurrency Revolution and President Biden's Formal Recognition - Out of the ashes of the 2008 financial crisis, Bitcoin sprang up like an insurgency, targeting both the unbridled activity of large financial...more
In this month’s Privacy & Cybersecurity Update, we examine the Illinois Supreme Court’s decision in a case involving workers compensation and the state’s Biometric Information Privacy Act, U.K. data transfer regimes before...more
CYBERSECURITY - FBI Warns Olympics/Paralympics Participants of Cyber “Activities” - On January 31, 2022, the FBI issued a Private Industry Notification entitled “Potential for Malicious Cyber Activities to Disrupt the...more
Many insurers contemplate using data from internet- connected devices, including wearables, for a deep dive into wearers’ lifestyles and invaluable insights for automated underwriting. Before diving into the deep end, there...more
Key Wireless Deadlines - Treasury Seeks Comment on Interim Final Rule Implementing Broadband Funding: Last month, the U.S. Department of Treasury (Treasury) issued an Interim Final Rule to implement the $350 billion...more
On January 28, 2021, privacy professionals around the world will celebrate Data Privacy Day. This year, we decided to mark the occasion by gathering our team’s thoughts and expectations on what we expect to be the biggest...more
Do you want a simple way to keep current on important privacy changes? Avoid sleepless nights wondering whether you missed a privacy speed bump or pothole between annual updates? Worry no longer. Troutman Pepper is pleased to...more
Background - Growing awareness regarding cybersecurity concerns with the Internet of Things (IoT) has achieved a milestone with the promulgation of the IoT Cybersecurity Improvement Act (the Act), which was signed into law by...more
This is the first article in a two-part series examining the enactment of California’s Internet of Things ("IoT") security law, and the wave of similar IoT laws expected to follow close behind in 2020. This part discusses the...more
As the coronavirus (COVID-19) spread around the world, most businesses were forced to close their doors temporarily and take steps towards working virtually. However, the U.S. construction industry, deemed “essential” by...more
As the NFL and other sports leagues contemplate how to resume operations in the face of the COVID-19 crisis, the availability of data has taken heightened importance as teams conduct activities such as free agency. The...more
Regulatory interest in Internet of Things (“IoT”) devices is growing, partly in response to concerns about device security. In January, for example, California’s IoT Law (SB 327) went into effect. This law requires...more
In this episode, Akin Gump public law and policy partner Ed Pagano and senior policy advisor Galen Roehl discuss privacy legislation being considered in the U.S. Congress....more
On January 1, 2020, California’s new Internet of Things (IoT) Security Law will go into effect. (Senate Bill 327.) Signed into law in September 2019, this is the first IoT-specific security law in the country. With all the...more
Q: How is the shift of medical devices moving to the Internet of Things affecting the health care industry? A: Connected medical devices routinely record sensitive health information about a patient. This critical...more
Energy Sector’s Reliance on IoT Increases Cyber Vulnerabilities - CyberX recently released its 2020 Global IoT/ICS Risk Report (Report), which compiles survey questions and answers from 1,821 production networks of...more
Whether thinking about managing oil and gas, water or other infrastructure facilities, or considering industrial efficiency, robotics and automation, you may be pondering how the Internet of Things (IoT) can be used to...more