News & Analysis as of

Risk Management Privacy Concerns Cybersecurity

Paul Hastings LLP

NFL Draft Provides Wake-Up Call on Protecting Confidential Information While Working Remotely

Paul Hastings LLP on

Last week’s NFL draft highlighted more than the accomplishments of athletes at the combine or on the field. While there was extensive coverage of the merits of each player, one of the major headlines coming out of the draft...more

J.S. Held

Data Privacy for the Future: Strategies to Limit Digital Risk and Liability

J.S. Held on

Your perspectives and perceptions towards a problem drive your approach to solving that problem. Managing data privacy challenges are no different. Therefore, to address today’s issues, it is a worthwhile exercise to review...more

K&L Gates LLP

Navigating the New Frontier: Insurance for Artificial Intelligence Risks

K&L Gates LLP on

On 27 December 2023, The New York Times filed a lawsuit against OpenAI and Microsoft alleging copyright infringement in connection with OpenAI’s popular ChatGPT technology. This lawsuit is part of the first wave of...more

Akin Gump Strauss Hauer & Feld LLP

Senate Majority Leader Schumer Continues Push for AI Framework

On Wednesday, June 21, 2023, Senate Majority Leader Chuck Schumer (D-NY) unveiled the five policy objectives underpinning his ongoing work on a legislative framework to regulate Artificial Intelligence (AI)—the Security,...more

Bradley Arant Boult Cummings LLP

Accountable AI Systems through Risk Management:  NIST Creates Inaugural Framework with Principles and Playbook

On January 26, 2023, the U.S. National Institute of Standards and Technology (NIST) released the Artificial Intelligence (AI) Risk Management Framework (AI Risk Management Framework 1.0), a voluntary guidance document for...more

Foley Hoag LLP - Security, Privacy and the...

Key Considerations for Health App Developers from the FTC

If your company creates health-related apps, the Federal Trade Commission (FTC) has set out some key considerations: - Make accurate representations. Clearly explain how people’s information will be used and shared and then...more

Akin Gump Strauss Hauer & Feld LLP

Policymakers Focusing in on Artificial Intelligence

Following a series of recent events involving policymakers from Trump’s Administration and Capitol Hill, artificial intelligence (AI) was the second hottest topic in D.C. These events, described in detail below, demonstrated...more

Mintz - Privacy & Cybersecurity Viewpoints

October Is National Cyber Security Awareness Month: NTIA Requests Comment on a Proposed Risk-Management Approach to Consumer Data...

Welcome to October! October 2018 marks the 15th year of the observance of National Cyber Security Awareness Month, a joint effort of the U.S. Department of Homeland Security and the National Cyber Security Awareness Alliance....more

K2 Integrity

Too Good to Be True: Cyber Safety Tips

K2 Integrity on

When seasoned investigators are exposed to online scams, the protective warnings they give to others on social media safety and internet fraud suddenly become real. Read on to see how one of our own dodged an online rental...more

Hogan Lovells

The connected home: From smart fish tanks to connected kitchen appliances, product companies must navigate GDPR and Product...

Hogan Lovells on

In this interview, Hogan Lovells Partner Valerie Kenyon and Senior Associate Anthea Davies — members of our Global Product Law team — discuss some of the exciting opportunities and challenges presented by the Internet of...more

Steptoe & Johnson PLLC

Alexa.......What is HIPAA?

The increased use of technology by health care providers requires new and innovative platforms to provide better services to patients. One platform that has garnered attention since its introduction in mid-2014 is Amazon’s...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #130 – Smartphones Targeted by Dark Caracal Attack

There is a global malware campaign that is targeting mobile devices across the world. It is called Dark Caracal, which is believed to be sourced in Beirut by the Lebanese General Security Directorate. ...more

Hogan Lovells

Post-market medical devices, cybersecurity, and the U.S. FDA’s growing concerns

Hogan Lovells on

From insulin pumps and pacemakers to defibrillators, medical devices increasingly rely on wireless and internet connectivity for efficient operations. Unfortunately, these interconnections also leave devices vulnerable to an...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - October 2017 #3

Robinson & Cole LLP on

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more

K2 Integrity

Cybersecurity Awareness: Limiting Your Exposure and Visibility

K2 Integrity on

We spend so much time on our mobile phones and on social media, yet often we don’t think of how these tools are broadcasting our lives as we work and play. With just a few steps, you can limit what you are digitally telling...more

BakerHostetler

[Webinar] Real Estate, Cybersecurity and The Internet of Things - October 10th, 12:00pm ET

BakerHostetler on

The Internet of Things (IoT) is rapidly changing the digital landscape for business. An increasing number of physical items – from refrigerators and televisions to cars and skyscrapers – are now connected to the Internet (and...more

Robinson+Cole Data Privacy + Security Insider

FBI Issues Warning about Internet-Connected Toys

We previously reported about the microphone and video capabilities of Echo technology. The FBI is also concerned about this technology being used in toys that are connected to the Internet....more

BCLP

Cybersecurity Issues of Self-Driving Vehicles

BCLP on

In the next five years we will see more and more self-driving vehicles, or autonomous vehicles, hit the market. An “autonomous vehicle” is a vehicle capable of navigating roadways and interpreting traffic-control devices...more

Robinson+Cole Data Privacy + Security Insider

In the Privacy of Your Home

By now, it’s pretty common knowledge that Alexa has been on a dollhouse shopping spree, and is also helping to solve a murder. Clearly, Alexa cannot be trusted and that’s why she has only limited trigger words, including...more

Hogan Lovells

NTIA Highlights Promise and Policy Challenges of IoT, Seeks Additional Comments

Hogan Lovells on

On January 12, 2017, prior to the new administration taking power, the National Telecommunications and Information Administration (NTIA) within the Department of Commerce (Department) released a Green Paper on “Fostering the...more

Orrick, Herrington & Sutcliffe LLP

What Did They Say About Cybersecurity in 2016? 8 Proclamations from Regulators and the Courts

There is no such thing as compliance with the NIST Cybersecurity Framework (FTC). In September, the FTC dispelled a commonly held misconception regarding the NIST Framework: It “is not, and isn’t intended to be, a standard or...more

Robinson+Cole Data Privacy + Security Insider

FDA issues guidance on cybersecurity risk management for medical devices

Friday (January 22, 2016), the Food and Drug Administration (FDA) published draft guidance for medical device makers on the importance of including cybersecurity measures in approved products. Further, the guidance highlights...more

Mintz - Privacy & Cybersecurity Viewpoints

Cyber Risks for the Boardroom Part 1: The Recent Increase in Focus on Privacy Issues

Each day this week, we are going to explore some of the issues in the rapidly growing area of cyberliability. We will examine the recent increase in focus on privacy issues, why directors should be concerned, the top...more

23 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide