The SaaS Tacks – The Ins and Outs of Negotiating SaaS Contracts
Employment and Workplace Discrimination Issues In Esports With Ruth Rauls and Lisa Koblin
Software Escrow: An enterprise resiliency tool every legal department should have in their toolbox (with Don Dennis Jr.)
Industry Implications of EO on Improving the Nation’s Cybersecurity
Humanizing AI In The Energy Industry
What’s Next?: Drones and transforming policy at GE
IP|Trend: New Era in Protection of Software by Intellectual Property Law?
On February 20, 2025, the Virginia General Assembly passed HB 2094 the Virginia High-Risk Artificial Intelligence Developer and Deployer Act (the “Act”). The bill now awaits signature by Governor Youngkin. If it becomes law,...more
On January 13, 2025, Texas Attorney General’s Office filed its first lawsuit enforcing the Texas Data Privacy and Security Act (“TDPSA”). The law went into effect on July 1, 2024. The complaint also states claims under Texas’...more
Since the start of the year, the Federal Trade Commission (FTC) has brought actions against – and reached proposed settlements with – three business ventures engaged in the collection, use and sharing of certain consumer...more
If you are participating in the digital advertising ecosystem, you likely are hearing a lot about pixels, tags, scripts and SDKs lately. But the terminology can be confusing, and terms are not always used consistently, making...more
As the use of artificial intelligence (AI) rapidly expands throughout the private sector and government, the Biden administration has published a report titled A Blueprint for an AI Bill of Rights. The report cites a myriad...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
The European Commission recently proposed the EU Cyber Resilience Act, a regulation on cybersecurity requirements for products with digital elements. The proposal introduces wide-ranging technical and governance measures that...more
The National Institute of Standards and Technology (NIST) issued a request for public comment to help guide the development of the current and future state of technology in eight emerging technology areas. Those areas include...more
The FTC recently settled with Infotrax Systems, L.C. a technology company providing software to the direct sales industry. The settlement followed a breach suffered by the company, and involved allegations the company had...more
With the California Consumer Privacy Act (“CCPA”) set to take effect on January 1, 2020, and the resulting looming specter of statutory damages and data breach class action litigation for failure to implement “reasonable...more
In a release aptly labeled “A Starting Point for IoT Device Manufacturers” the National Institute of Standards and Technology (NIST), an arm of the Department of Commerce, recently added to the discussion with the...more
In this episode, Dreamscape Immersive chief legal officer Tammy Brandt and Akin Gump corporate partner Courtney York, whose practice includes guiding clients through complex tech transactions, discuss the business and law of...more
Artificial Intelligence (AI) systems, including the use of algorithms and computer software to analyze complex data and perform certain decision making functions without direct human involvement, are rapidly developing in...more
Twenty-five years ago most companies’ greatest fear of espionage was employee theft at the photocopy machine at 2 in the morning. The company playbook could not be forwarded in an email or put on a thumb drive in a matter of...more
You recently may have heard news reports regarding new security threats known as "Meltdown" and "Spectre." Not to be mistaken for the latest Hollywood box-office offering, these new threats allow attackers to exploit a design...more
In a significant shift in the way the tech industry responds to hackers, an increasing number of companies are resorting to use of “bug bounty” programs that reward hackers who identify flaws in their company software and...more
On August 11, 2015, the Online Trust Alliance (OTA) released an Internet of Things (IoT) Trust Framework (“the Framework”), which presents guidelines for IoT manufacturers, developers, and retailers. The Framework was...more