It is hard to believe that we are starting the 25th year of the 21st century. The rapid evolution that technology, privacy and data security have undergone these last 25 years is mindbending. Yet, as we enter 2025, it still...more
2/6/2025
/ Class Action ,
Class Certification ,
Consumer Privacy Rights ,
Consumer Protection Laws ,
Critical Infrastructure Sectors ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Personal Data ,
Privacy Laws ,
Privacy-By-Design ,
Regulatory Agenda ,
Technology ,
Technology Sector ,
Tracking Systems ,
VPPA ,
Web Tracking ,
Websites ,
Wiretapping
Critical infrastructure facilities are increasingly vulnerable to cybersecurity events, as demonstrated by the number of cyberattacks that have occurred this year against utilities including those in the energy sector...more
A year ago, we highlighted the National Institute of Standards and Technology’s ("NIST") release of a framework designed to address AI risks (the “AI RMF”). We noted how it is abstract, like its central subject, and is...more
Just over a year ago, the White House issued its long-awaited National Cybersecurity Strategy, with an emphasis on defending Critical Infrastructure, promoting public and private collaboration, and safeguarding...more
4/23/2024
/ Critical Infrastructure Sectors ,
Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) ,
Cyber Threats ,
Cybersecurity ,
Data Protection ,
Data Security ,
Hackers ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
National Security ,
Popular ,
Public Health ,
Ransomware
The race to leverage the digital transformation potential for generative artificial intelligence (AI) has reached fever-pitch levels that began last November with the release of ChatGPT. The fast rise of emerging technologies...more
As artificial intelligence and machine learning (collectively “AI”) models continue to develop, become more sophisticated, and generate significant media coverage, companies are increasingly considering the integration of AI...more
AI may be both the most “powerful capability of our time” and the “most powerful weapon of our time."
That’s according to Jen Easterly, Director of the Cybersecurity and Infrastructure Security Agency, when interviewed...more
7/26/2023
/ Artificial Intelligence ,
Cybersecurity ,
Data Management ,
Data Privacy ,
Data Security ,
Federal Trade Commission (FTC) ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Innovative Technology ,
Machine Learning ,
Personal Information ,
Security Standards
In March, the White House issued its long-awaited National Cybersecurity Strategy. The strategy includes five pillars, Pillar One being “Defend Critical Instructure” with its first and second subparts focusing on (1)...more
Two months ago, the White House released its National Cybersecurity Strategy. Since then, various government agencies have issued new cybersecurity guidance for certain critical infrastructure subsectors. For example, the...more
5/16/2023
/ Aviation Industry ,
Biden Administration ,
Cooperative Compliance Regime ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cybersecurity ,
Data Protection ,
Data Security ,
Environmental Protection Agency (EPA) ,
Hackers ,
National Security ,
Popular ,
Regulatory Reform ,
Technology Sector ,
Transportation Industry ,
Water Management
On May 3rd, Lina Khan, the Chair of the Federal Trade Commission, made clear that the FTC is well equipped to handle the issues brought to the fore by the A.I. sector, “including collusion, monopolization, mergers, price...more
Today, after months of rumors regarding its release and contents, the White House issued its National Cybersecurity Strategy “to secure the full benefits of a safe and secure digital ecosystem.” The full strategy is 39 pages...more
3/2/2023
/ Biden Administration ,
Consumer Privacy Rights ,
Critical Infrastructure Sectors ,
Cybersecurity ,
Data Management ,
Data Privacy ,
Data Protection ,
Data Security ,
Incident Response Plans ,
Information Governance ,
Information Technology ,
National Security ,
New Guidance ,
Regulatory Reform
Last month, amidst the furor around its proposal to ban the use of non-compete agreements, the Federal Trade Commission (“FTC”) announced the settlement of cases involving Fintech and EdTech companies with similarities to its...more
Crypto is dead or on life support, waiting for regulation to rid it of ‘crypto contagion.’ Meanwhile, blockchain technology – the virtual, public ledger technology that records crypto transactions – is very much alive, as...more
Last week classes for elementary schools, high schools and a community college in Boston were canceled due to a cyberattack. Last month an Arkansas school district approved a payment of $250,000 to cybercriminals to retrieve...more
Operational technology (OT) is hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes and events. By design, OT underpins many critical...more
12/22/2022
/ Advanced Notice of Proposed Rulemaking (ANPRM) ,
Corporate Counsel ,
Critical Infrastructure Sectors ,
Cybersecurity ,
Data Security ,
Department of Homeland Security (DHS) ,
Innovative Technology ,
IT Systems ,
Railroads ,
Security Standards ,
Software ,
TSA
Last year Colonial Pipeline halted one of the United States’ largest pipeline systems due to a ransomware attack. Within days a state of emergency was declared in 17 states. A few days later the pipeline resumed service, and...more
12/1/2022
/ Biden Administration ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cybersecurity ,
Executive Orders ,
Hackers ,
National Security ,
Pipelines ,
Popular ,
Ransomware ,
Threat Management
On Monday the Federal Trade Commission issued a press release stating it is settling a case against Drizly and its CEO for a data breach that exposed the information of 2.5 million consumers in July 2020. The proposed...more
10/27/2022
/ Compliance Management Systems ,
Corporate Governance ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Federal Trade Commission (FTC) ,
Liability ,
Malware ,
Popular ,
Risk Assessment
On September 30, 2022, the White House kicked off Cybersecurity Awareness Month by reminding citizens of the impacts cyberattacks can have on critical infrastructure such as “electric grids and fuel pipelines … and many other...more
10/11/2022
/ Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Management ,
Data Protection ,
Enforcement Actions ,
Incident Response Plans ,
Information Technology ,
Popular ,
Regulatory Standards ,
Reporting Requirements ,
Risk Assessment ,
Uber