News & Analysis as of

Software

Is it HIPAA or HIPPA? Either way, it still applies.

by Winstead PC on

I have negotiated hundreds of SaaS agreements for dozens of software companies and I always hated when the company on the other side was a healthcare provider. Invariably, they would bring up Protected Health Information...more

Three Years of Alice: Federal Circuit Cases Upholding Patent Eligibility Under Alice Step 1

It has now been over three years since the U.S. Supreme Court handed down its transformative patent decision in Alice Corp. v. CLS Bank. During that time, the Federal Circuit has issued only a precious few decisions upholding...more

Financial Services Quarterly Report - Third Quarter 2017: Luxembourg Developments

by Dechert LLP on

Luxembourg recently has taken a number of actions in connection with the transposition or implementation of various EU directives and regulations, respectively, into national law. The Luxembourg government deposited a bill of...more

Avoiding Glittering Generalities in Selecting eDiscovery Software – Considering Cost: eDiscovery Best Practices

by CloudNine on

...Budgetary constraints are a common hurdle for law firms and legal departments seeking to address the legal, technological, and business elements of eDiscovery. This economic constraint is compounded by the lack of...more

[Webinar] An M&A Primer for Software Companies - October 18th, 1:00pm ET

by BakerHostetler on

When contemplating a sale of your company, your hope as a businessperson and software engineer is that you have made it as valuable as possible. From a legal perspective, there are some simple, yet important, steps to...more

Avoiding Glittering Generalities in Selecting eDiscovery Software – Considering Complexity: eDiscovery Best Practices

by CloudNine on

...The ability of eDiscovery software to deal with data complexity such as being able to ingest and process an increasing number of data formats is one of the most important challenges faced by eDiscovery professionals today....more

[Webinar]: On Premise or Off Premise? A Look At Security Approaches to eDiscovery - October 11th, 12:00pm CT

by CloudNine on

Today, when consumers are considering their eDiscovery technology choices, there are more factors to consider than ever. In addition to considering the functionality of the software application, you now also have to consider...more

Avoiding Glittering Generalities in Selecting eDiscovery Software – Considering Capability: eDiscovery Best Practices

by CloudNine on

...Once the security of a potential solution has been considered, the next reasonable area of examination and evaluation is that of capability. Assessing capability is just determining whether or not a solution can accomplish...more

European General Court Rules (again) on Mandatory Access and Interoperability in Software Industry

by Jones Day on

The Ruling: A recent European General Court decision provided valuable guidance on applying abuse of dominance rules (Article 102 TFEU) in the context of software products and provided some welcome clarifications regarding...more

Avoiding Glittering Generalities in Selecting eDiscovery Software – Considering Security: eDiscovery Best Practices

by CloudNine on

...The security of data is fast becoming one of the most prominent and visible areas of concern in the selection of eDiscovery software solutions. With public examples of data security failures increasing in regularity and...more

Technology Policies Protect The Company and its IP

A computer and technology policy is an important part of protecting and managing intellectual property. A business should consider establishing a policy that addresses the following points...more

Avoiding Glittering Generalities in Selecting eDiscovery Software: eDiscovery Best Practices

by CloudNine on

...Forget the glittering generalities of opinioned providers and professionals trying to champion a particular approach to eDiscovery at the exclusion of others. The reality is that on-premise and off-premise solutions...more

Consortiq Software System Demonstrates Security For UAS Is Possible

Unmanned aerial systems (UAS or drone) security has become a hot topic not only in the United States, but throughout countries around the world as more UAS hit the skies, increasing the potential for hackers to intercept data...more

News Of Apple’s Software Update Causes Debate In Ad Tech Community

by King & Spalding on

On September 14, 2017, six major advertising groups addressed Apple with an open letter, asking the company to re-think its plans to introduce smart cookie-blocking technology in its upcoming software update for Safari in iOS...more

Lenovo-FTC Consent Order Calls For 20-Year Monitoring Period

by Jackson Lewis P.C. on

Laptop-maker Lenovo (United States), Inc. agreed to a no-fault settlement with the Federal Trade Commission and 32 states over allegations that it installed ad software that compromised customers’ web security and invaded...more

Building a Health App? Part 2: Protecting Your Intellectual Property

This post is the second in a series of weekly blog posts covering legal issues for consideration during the early stages of development of a health app and providing best practices to help guide you through a successful...more

Building a Health App? What You Need to Know

Last week, Apple announced the new Apple Watch Series 3 which will feature an enhanced heart rate app. The app will notify you when it detects an elevated heart rate even when you are not working out. The sensor will also be...more

President Trump Blocks Chinese-Funded Acquisition of U.S. Semiconductor Company

• President Trump issued an order prohibiting the proposed $1.3 billion takeover of Lattice Semiconductor Corporation, a U.S. company, by Canyon Bridge Capital Partners, Inc., a private equity firm funded by Chinese...more

Preloaded Adware That Risked User Data Costs Lenovo $3.5 Million

by King & Spalding on

Last week, Lenovo Inc. agreed to pay $3.5 million to settle allegations that it installed monitoring and advertising software on its laptops. The lawsuit was brought by the Federal Trade Commission (“FTC”) and 32 state...more

Time to Review Your Encryption Classifications – BIS Updates Primary Purpose Exemption

by Kelley Drye & Warren LLP on

The Bureau of Industry and Security (BIS) recently published changes to its encryption regulations in an effort to simplify the text and focus the scope of controls. The biggest change is that Note 4, the “primary purpose...more

Lenovo Agrees to Settle Data Security Case with FTC and 32 AGs

The Federal Trade Commission (FTC) announced on September 5, 2017, that it has settled with Lenovo regarding allegations that Lenovo “harmed customers by pre-loading software on some laptops that compromised security...more

Key Takeaways from FTC Settlement with Lenovo Over Pre-Installed “Man-in-the-Middle” Software

On September 5, 2017, the Federal Trade Commission (“FTC”) announced that it had agreed to enter into a settlement with Lenovo Inc., which allegedly preloaded some of its computers with invasive software that compromised...more

Lenovo Settles FTC Charges Regarding Pre-Installed Software That Compromised Consumers' Cybersecurity and Privacy

On September 5, 2017, the Federal Trade Commission (FTC) announced that it and 32 state attorneys general had settled charges with Lenovo regarding the company's practice of pre-loading software on its laptops that...more

The Sisyphean Labor of the DAR Council: Segregation and Reintegration Data Rights

by PilieroMazza PLLC on

Having just presented on data rights issues to a number of government contracting officers and procurement professionals, as well as private sector contract management personnel, during the 2017 National Contract Management...more

German Regulators Craft Guidelines Addressing the Ethical Issues Raised by Driverless Cars

by Foley & Lardner LLP on

As driverless cars prepare to enter the roadway, regulators are closely considering the implications of how software is programmed. When faced with an imminent risk of collision or injury, how will the software decide which...more

846 Results
|
View per page
Page: of 34
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.