In Snap, Inc. v. Vidal, the Central District of California found the Trademark Trial and Appeal Board (“TTAB”) was wrong in finding that SnapChat’s SPECTACLES mark is generic for smart glasses. The district court’s opinion...more
On October 10, 2024, the EU Cyber Resilience Act ("CRA") was adopted by the Council of the European Union....more
The Proposed Rule imposes substantial new reporting, diligence, and compliance obligations for companies in the automotive supply chain - On September 26, 2024, the U.S. Department of Commerce’s Bureau of Industry and...more
On September 26, 2024, the US Department of Commerce (Commerce) published a Notice of Proposed Rulemaking (NPRM) that would restrict the importation and sale of connected vehicles and related equipment of Chinese and Russian...more
On October 10, 2024, the European Council officially adopted the Cyber Resilience Act (CRA), a regulation designed to ensure that products with digital features are secure to use and resilient against cyber threats, and that...more
Editor’s Note: Read the transcript from HaystackID’s webcast, “From Mac to Mobile: Advanced Data Triage and Collection Tools for Forensic Investigators,” to learn about HaystackID’s Remote Endpoint Analysis and Data...more
On Sept. 26, the Department of Commerce’s Bureau of Industry and Security (BIS) and Office of Information and Communications Technology and Services (OICTS) published a Notice of Proposed Rulemaking (NPRM) entitled,...more
Share on Twitter Print Share by Email Share Back to top On September 26, 2024, the Department of Commerce’s Bureau of Industry and Security (BIS) published a Notice of Proposed Rulemaking that, if finalized, would prohibit...more
The U.S. Department of Commerce's Bureau of Industry and Security (BIS) issued a Notice of Proposed Rulemaking (Proposed Rule) on Sept. 26, 2024, to address certain undue or unacceptable risks identified in Executive Order...more
On September 26, 2024, the Office of Information Communications Technology Services (OICTS) within the Bureau of Industry and Security of the U.S. Department of Commerce published a long-awaited proposed rule to regulate the...more
The deadline is fast approaching for in-scope financial entities and their ICT service providers to conform to the EU’s new digital operational resilience regulation. With effect from 17 January 2025, a broad range of EU...more
On September 23, 2024, the Department of Commerce’s Bureau of Industry and Security (BIS) released for public inspection a Notice of Proposed Rulemaking that seeks to prohibit the sale or import of connected vehicles (CVs)...more
Effective information security is no longer just dependent on an organisation’s own internal cybersecurity controls. The UK Information Commissioner’s Office (ICO) highlights that third-party service providers are processing...more
While most entities that are subject to the HIPAA Security Rule spend considerable time and effort ensuring that they have implemented appropriate administrate and technical safeguards to protect the health information that...more
Industries around the world have been hugely affected by global events over the past several years. Wars, famine and water shortages, political unrest and pandemics have all contributed to persistent supply constraints for...more
With consumer-grade forms of quantum computing nearing availability, this technology has the potential to permeate every aspect of daily life by solving certain types of problems exponentially faster—in some cases performing...more
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the week of June 17-23. Here’s what’s...more
Recently, NAVEX connected with Michael Terrell, Senior Managing Director and Edwin Harris II, Manager, Business Solutions, to talk about Per Scholas and their impact. Per Scholas originated more than 30 years ago in the Bronx...more
On March 18, the USPTO issued a guidance document on how to examine claims that recite functional limitations without necessarily using the term “means” under 35 U.S.C. § 112. The guidance document aims to improve clarity,...more
Melissa Duffy and Trevor Coval contributed their thought leadership to the American Conference Institute’s 14th Annual Global Encryption, Cloud & Cyber Export Controls Conference, held in San Francisco on May 14-16. Melissa...more
Editor’s Note: In this insightful discussion between John Wilson, Chief Information Security Officer and President of Forensics at HaystackID, and Rene Novoa, Director of Forensics at HaystackID, we delve into the intricate...more
As supply chains have become more digitized and interconnected, they have also become more vulnerable to a range of cyber threats. These threats not only pose risks to the direct operations of companies but also to the...more
The Internet of Things (“IoT”) has ushered in a new era of connectivity and convenience, but with it comes a host of legal issues and emerging theories of liability. As IoT devices become increasingly ubiquitous in our daily...more
Understanding how hardware and firmware/software work together to perform desired functions or tasks is an important enabler to unlocking the value of intellectual properties in the systems (including embedded systems) area....more
February 5, 2024: Destroying Solid State Drives - The Tip of the Night for March 25, 2022, mentioned that the data on solid state drives cannot be degaussed because such drives do not use magnetic fields to store data. A USB...more