News & Analysis as of

Software Data Collection Data Protection

J.S. Held

Harnessing Real-Time Earthquake Intelligence: Using Shakecast for Earthquake Risk Management

J.S. Held on

For building owners managing thousands of properties the risk posed by earthquakes is a significant concern. Rapid response is crucial to ensure the safety of occupants and the integrity of buildings. In the aftermath of an...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Emerging Theories of Liability in the Internet of Things Era

The Internet of Things (“IoT”) has ushered in a new era of connectivity and convenience, but with it comes a host of legal issues and emerging theories of liability. As IoT devices become increasingly ubiquitous in our daily...more

Nextpoint, Inc.

eDiscovery for the Rest of Us: The Checklist Manifesto

Nextpoint, Inc. on

Nextpoint and Tom O’Connor published a new edition of eDiscovery for the Rest of Us, a strategic and tactical resource for legal teams navigating the modern ediscovery landscape. The 2024 version features new content,...more

Epstein Becker & Green

Florida Expands Privacy Protections Including a Ban on Offshoring of Certain Patient Data

Recently, Florida Governor Ron DeSantis signed Senate Bill 262 and Senate Bill 264 into law. These new laws grant Floridians greater control over their personal data and establish a new standard for data handling and...more

Osano

GDPR Data Mapping: A How-To Guide

Osano on

If you don’t know where your business collects, stores, and processes consumer data, you can’t manage that data in a compliant fashion. You won’t know whether...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

Spilman Thomas & Battle, PLLC

Tech Vendors and Cybersecurity – Are They Responsible?

It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you if its product is compromised and results in a data...more

J.S. Held

Litigation Surge From the Use of Tracking Technology & the Sharing of Healthcare and Personal Data

J.S. Held on

Introduction: Tracking Software in the Healthcare Industry - Privacy-related concerns have become increasingly prominent in recent years, especially with the widespread use of third-party tracking tools such as tracking...more

Reveal

What is Corporate Law? And How It Will Evolve in 2023

Reveal on

Corporate lawyers are held in high regard in the business world, and for good reason. Corporations rely on their lawyers to perform an ever-wider variety of functions. This increased reliance is due, in part, to...more

Nextpoint, Inc.

Managing Ediscovery In The Cloud: Practical, Ethical and Technical Considerations For Lawyers

Nextpoint, Inc. on

In this excerpt from our white paper on managing ediscovery in the cloud, we explain the basics of the cloud and its biggest benefits in ediscovery. Click here to download the full white paper. As early pioneers of cloud...more

A&O Shearman

Software, connectivity, data and fintech dominate M&A in Silicon Valley

A&O Shearman on

As transaction activity in the tech sector continues to power ahead, new challenges and opportunities are confronting Silicon Valley companies and setting the agenda for the industry....more

Robinson+Cole Data Privacy + Security Insider

Adobe Introduces Software to Replace Third-Party Cookies

This week Adobe Inc. released some updated software for companies to target customers with advertising and offers using the brands’ own data as opposed to third-party cookies. ...more

Brooks Pierce

Not In My House – California To Regulate IoT Device Security

Brooks Pierce on

On Friday, Sept. 28, 2018, California Governor Jerry Brown signed into law first-in-the-nation legislation requiring that manufacturers include “reasonable security features” on any device that is “capable of connecting to...more

Robinson+Cole Data Privacy + Security Insider

Consortiq Software System Demonstrates Security For UAS Is Possible

Unmanned aerial systems (UAS or drone) security has become a hot topic not only in the United States, but throughout countries around the world as more UAS hit the skies, increasing the potential for hackers to intercept data...more

Mintz - Privacy & Cybersecurity Viewpoints

Colorado Student Data Privacy Bill – What EdTech software providers need to know

Colorado is the latest state to revisit, and expand upon, its laws pertaining to the use and protection of student data. Colorado Governor John Hickenlooper recently signed into law House Bill 16-1423 (the “Bill”) designed to...more

Pillsbury Winthrop Shaw Pittman LLP

How to Fail in the Internet of Things

Innovation is prized in the growing space of the Internet of Things (IoT). But an innovative product design is not enough, and potential pitfalls abound. As demonstrated in a report published by the Federal Trade Commission...more

16 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide