In recent years, products liability law has been significantly impacted by advancements in technology, particularly with the rise of artificial intelligence (AI) and automation. As more companies adopt these technologies to...more
5/15/2023
/ Artificial Intelligence ,
Automation Systems ,
Cyber Threats ,
Cybersecurity ,
Design Defects ,
Medical Devices ,
Personal Data ,
Popular ,
Privacy Laws ,
Social Media ,
Strict Product Liability
If you clicked on this post, that means you probably fall into one of two categories. Category 1: You are really tired of having to come up with – and remember – increasingly more complicated passwords, only to then be asked...more
9/20/2018
/ Authentication ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Passwords ,
Popular ,
Risk Management ,
Security Risk Assessments
Self-driving cars and related legal issues have captivated the cybersecurity world as of late. And with good reason. In 2018 we saw the first fatality associated with a self-driving Uber, adding to the growing attention paid...more
5/15/2018
/ Algorithms ,
Artificial Intelligence ,
Automation Systems ,
Automotive Industry ,
Connected Cars ,
Cybersecurity ,
Driverless Cars ,
Innovative Technology ,
Manufacturers ,
Motor Vehicles ,
NTSB ,
Popular ,
Regulatory Standards ,
Safety Standards ,
State and Local Government ,
Uber
According to most in the automotive industry, a world where self-driving cars and fully automated trucks begin to fill our intersections and highways is still at least a decade or so away. Creative theories abound for how...more
2/28/2018
/ Automotive Industry ,
Commercial Truck Drivers ,
Connected Cars ,
Cybersecurity ,
Driverless Cars ,
EU ,
Japan ,
Popular ,
Privacy Concerns ,
Trucking Industry ,
V2V
Unless you have been living under a rock, you are probably aware that companies are suffering cyber attacks that jeopardize sensitive company or customer data more and more frequently. What you may not know is that even more...more
10/24/2017
/ Breach Notification Rule ,
Cyber Attacks ,
Cyber Incident Reporting ,
Cyber Insurance ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Popular ,
Training