News & Analysis as of

Software Information Technology Data Privacy

Ankura

Optimizing Organizational Efficiency Through Tool Rationalization

Ankura on

In an era where technology drives business success, organizations often find themselves managing an overwhelming number of tools and applications — whether purchased officially through procurement or individually at a...more

A&O Shearman

The EU Cyber Resilience Act - What You Need to Know

A&O Shearman on

The EU Cyber Resilience Act (CRA) entered into force on 10 December 2024. The CRA is the first legislation of its kind in the world that aims to enhance the cyber security of products or software with a digital component...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

Supply Chain Attacks in the UK: Reducing Risk and Preparing for Upcoming Legal Changes

Effective information security is no longer just dependent on an organisation’s own internal cybersecurity controls. The UK Information Commissioner’s Office (ICO) highlights that third-party service providers are processing...more

CloudNine

Streamlining Data Collection in Modern eDiscovery

CloudNine on

As an eDiscovery software and services provider who has worked with hundreds of law firms, corporate legal and government teams over the past 20 years, we have learned ways to make the process of data collection for...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Emerging Theories of Liability in the Internet of Things Era

The Internet of Things (“IoT”) has ushered in a new era of connectivity and convenience, but with it comes a host of legal issues and emerging theories of liability. As IoT devices become increasingly ubiquitous in our daily...more

Nossaman LLP

Critical Infrastructure Organizations Warned to Upgrade Systems and Software

Nossaman LLP on

In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more

Faegre Drinker Biddle & Reath LLP

Cybersecurity Safeguard Implemented by Superior Court of New Jersey for OUS Web Traffic

Last year, we explored the Federal Judiciary’s new safeguards and procedures to protect sensitive court records in light of the SolarWinds Orion cybersecurity breach. Now, as a result of increased hostilities between Russia...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #297 – Vulnerability in Smart Home Devices Including Baby Monitors

Mandiant, a division of FireEye, has reported that it has discovered a vulnerability in a software protocol that enables hackers to gain access to audio and visual data on smart devices including baby monitors and web...more

Esquire Deposition Solutions, LLC

Lawyers, Be Tough Customers When Purchasing Technology

Lawyers, ask yourselves:  Can I ethically connect my work laptop computer to an unsecured public Wi-Fi network? What data security measures are in place at the technology vendors that store and process my clients’...more

Hogan Lovells

Children's rights in the digital world: new guidelines in the Netherlands

Hogan Lovells on

On 12 March 2021, the "Code for Children's Rights" ("Code voor Kinderrechten") was launched in the Netherlands. The Code was developed by the University of Leiden and the Waag organisation commissioned by the Dutch...more

McGlinchey Stafford

The New ‘Smart’ Car: An Introduction To Connected Car Payments

McGlinchey Stafford on

The what: What are connected car payments? Connected car payments are a subset of connected car technology. Connected cars are vehicles with technology integrated into the user’s daily life that allow the vehicle to...more

Mitratech Holdings, Inc

20/20 for 2020: Bold Legal Ops Predictions for the New Year

It’s that season again; not just for celebrating a new year, but for making predictions about it…and beyond. Especially when it comes to what may lie ahead in Legal Ops, data privacy, and information governance. ...more

12 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide