News & Analysis as of

Software Developers Data Breach

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

Wiley Rein LLP

Industry Implications of EO on Improving the Nation’s Cybersecurity

Wiley Rein LLP on

President Biden’s recent issuance of the highly anticipated Executive Order on Improving the Nation’s Cybersecurity (EO or Order), in the midst of high-profile cyber-attacks on the Nation, brought new challenges to...more

Robinson+Cole Data Privacy + Security Insider

Software Development Teams: Are You Using JetBrains’ TeamCity?

Development and Operations (DevOps) teams are often pressured by executives and sales teams to get software products completed and out the door and into the market as quickly as possible so the products can generate income....more

Burr & Forman

COVID-19, Mobile Health & the Importance of Maintaining Legal Compliance in an Era of Explosive Growth

Burr & Forman on

It is increasingly important for mobile app developers to ensure their products comply with all governing state and federal laws, and it is critical to understand which business changes might place your product under a...more

Sheppard Mullin Richter & Hampton LLP

FTC and Software Company Reach Security Settlement Over Unfair Practices

The FTC recently settled with Infotrax Systems, L.C. a technology company providing software to the direct sales industry. The settlement followed a breach suffered by the company, and involved allegations the company had...more

Dorsey & Whitney LLP

CCPA Requires “Reasonable Security”: but You Can’t have Reasonable Security Without Proper Vulnerability Management

Dorsey & Whitney LLP on

With the California Consumer Privacy Act (“CCPA”) set to take effect on January 1, 2020, and the resulting looming specter of statutory damages and data breach class action litigation for failure to implement “reasonable...more

Morgan Lewis

Developing Software with Security in Mind: NIST White Paper Recommends Secure Software Development Framework

Morgan Lewis on

The National Institute of Standards and Technology (NIST) recently circulated a draft white paper discussing recommended security practices to be adopted throughout the various phases of software development. The white paper...more

Jones Day

Jones Day Global Privacy & Cybersecurity Update | Vol. 21

Jones Day on

UNITED STATES - Regulatory—Policy, Best Practices, and Standards - NIST Evaluates Advances in Face Recognition Software - On November 30, 2018, the National Institute of Standards and Technology ("NIST") published a...more

Robins Kaplan LLP

Your Daily Dose of Financial News

Robins Kaplan LLP on

A recap of Friday’s GDP numbers, which featured both a strong 3.5% growth rate and early signs that “the growth could cool in coming months”...more

K&L Gates LLP

K&L Gates Triage: Artificial Intelligence in Health Care

K&L Gates LLP on

Artificial Intelligence (AI) systems, including the use of algorithms and computer software to analyze complex data and perform certain decision making functions without direct human involvement, are rapidly developing in...more

Snell & Wilmer

Has Your Computer Been Hijacked For Illicit Cryptocurrency Mining?

Snell & Wilmer on

Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more

Bass, Berry & Sims PLC

Privacy Perils: Avoiding the Spectre of a Meltdown

Bass, Berry & Sims PLC on

You recently may have heard news reports regarding new security threats known as "Meltdown" and "Spectre." Not to be mistaken for the latest Hollywood box-office offering, these new threats allow attackers to exploit a design...more

Patterson Belknap Webb & Tyler LLP

The Tanium Affair Reminds Us That Cybersecurity Risks Are Everywhere

The Wall Street Journal recently reported that well-known cybersecurity startup Tanium, Inc. had been inadvertently exposing one of its clients’ sensitive data during product demonstrations....more

Fenwick & West LLP

Intellectual Property Bulletin - Winter 2017

Fenwick & West LLP on

A Smooth Patch in a Rough Road? Governmental Transition and Intellectual Property - Whenever a new Congress convenes, some IP issues come to the fore while others take a back seat. Transition to a new administration in the...more

Kelley Drye & Warren LLP

Vermont Settles with B2B Software Developer over Security Practices

Kelley Drye & Warren LLP on

Yesterday, the Vermont Attorney General announced a settlement with business-to-business software developer Entrinsik, Inc., resolving allegations that the company’s Informer program violated Vermont law, including the law...more

King & Spalding

“Bug Bounty” Programs Grow In Popularity

King & Spalding on

In a significant shift in the way the tech industry responds to hackers, an increasing number of companies are resorting to use of “bug bounty” programs that reward hackers who identify flaws in their company software and...more

Foley & Lardner LLP

From Carjacking to Carhacking – Lessons for the Internet of Things

Foley & Lardner LLP on

The Internet of Things (IoT) is coming and perhaps the first place we will see the proverbial rubber hit the road is with something near and dear to Americans – our cars. The ever increasing connectivity of cars is creating a...more

17 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide