News & Analysis as of

Software Developers Data Protection Data Privacy

Williams Mullen

Virginia’s High-Risk AI Developer and Deployer Act Awaits Governor’s Signature

Williams Mullen on

On February 20, 2025, the Virginia General Assembly passed HB 2094 the Virginia High-Risk Artificial Intelligence Developer and Deployer Act (the “Act”). The bill now awaits signature by Governor Youngkin. If it becomes law,...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

Akin Gump Strauss Hauer & Feld LLP

NIST Seeks Public Comment on Eight Emerging Technology Areas to Advance More Productive Tech Economy

The National Institute of Standards and Technology (NIST) issued a request for public comment to help guide the development of the current and future state of technology in eight emerging technology areas. Those areas include...more

Sheppard Mullin Richter & Hampton LLP

FTC and Software Company Reach Security Settlement Over Unfair Practices

The FTC recently settled with Infotrax Systems, L.C. a technology company providing software to the direct sales industry. The settlement followed a breach suffered by the company, and involved allegations the company had...more

Dorsey & Whitney LLP

CCPA Requires “Reasonable Security”: but You Can’t have Reasonable Security Without Proper Vulnerability Management

Dorsey & Whitney LLP on

With the California Consumer Privacy Act (“CCPA”) set to take effect on January 1, 2020, and the resulting looming specter of statutory damages and data breach class action litigation for failure to implement “reasonable...more

Faegre Drinker Biddle & Reath LLP

NIST Unveils IoT Baseline of Core Cybersecurity Features for Comment

In a release aptly labeled “A Starting Point for IoT Device Manufacturers” the National Institute of Standards and Technology (NIST), an arm of the Department of Commerce, recently added to the discussion with the...more

K&L Gates LLP

K&L Gates Triage: Artificial Intelligence in Health Care

K&L Gates LLP on

Artificial Intelligence (AI) systems, including the use of algorithms and computer software to analyze complex data and perform certain decision making functions without direct human involvement, are rapidly developing in...more

Fisher Phillips

Why Your Company Should Be Using Email Enterprise Vaults, Anti-Deletion Programming and Key Stroke Surveillance Software in the...

Fisher Phillips on

Twenty-five years ago most companies’ greatest fear of espionage was employee theft at the photocopy machine at 2 in the morning. The company playbook could not be forwarded in an email or put on a thumb drive in a matter of...more

Bass, Berry & Sims PLC

Privacy Perils: Avoiding the Spectre of a Meltdown

Bass, Berry & Sims PLC on

You recently may have heard news reports regarding new security threats known as "Meltdown" and "Spectre." Not to be mistaken for the latest Hollywood box-office offering, these new threats allow attackers to exploit a design...more

King & Spalding

“Bug Bounty” Programs Grow In Popularity

King & Spalding on

In a significant shift in the way the tech industry responds to hackers, an increasing number of companies are resorting to use of “bug bounty” programs that reward hackers who identify flaws in their company software and...more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide