News & Analysis as of

Data Security Personal Data Internet of Things

Bradley Arant Boult Cummings LLP

Avoiding growing pains in the development and use of digital twins

Novel technologies that seek to improve quality of life or simplify complex processes offer great promise. For example, medical technologies that detect or cure disease or supply chain technologies that allow for real time...more

Sheppard Mullin Richter & Hampton LLP

Cybersecurity Labeling Program to Increase Transparency of IoT Device Security

In response to a constantly-evolving cyber threat landscape, the Biden Administration recently announced the launch of a new cybersecurity labeling program – the U.S. Cyber Trust Mark program – in an effort to enhance...more

Lathrop GPM

2022 Legal Guide to Privacy and Data Security

Lathrop GPM on

Facial recognition technology, drones the size of a butterfly, secure microchips replacing magnetic stripes on credit cards, sensors the size of a grain of sand swallowed by patients that transmit data directly to the...more

Faegre Drinker Biddle & Reath LLP

Buyer Beware: The Internet of Things Comes Under New Cyber Attack from Multiple Fronts

It is estimated that by the end of 2020, there will be more than 50,000,000,000 (yes, billion) connected devices that are part of the Internet of Things (IoT). This is a five million percent increase in IoT devices over the...more

Skadden, Arps, Slate, Meagher & Flom LLP

Privacy & Cybersecurity Update - September 2018

In this month's Privacy & Cybersecurity Update, we examine recent trends and court decisions, including a new law in Ohio that provides a safe harbor from tort-based data breach claims if the company adopts certain security...more

Jackson Walker

Internet of Things Part 2: Dogs, Cameras, and Cybersecurity

Jackson Walker on

I recently purchased an Internet Protocol (IP) camera to monitor my dog, Ruben, during those times that he has free reign of the house. Since “RubenCam” has been online, I’m not sure he has been any less rambunctious, but I’m...more

Hogan Lovells

Best practices for managing cybersecurity risks related to IoT-connected medical devices

Hogan Lovells on

Connected medical devices deliver numerous benefits not available before, including improved monitoring of patient welfare and a wealth of vital data. But for all the advantages available through these devices, their...more

Hogan Lovells

Strengthening international ties – Can support increased convergence of privacy regimes

Hogan Lovells on

The internet has become today’s global trade route, and personal data is one of its major currencies. The growth in the digital economy is impressive. One study found that economic activity taking place over the internet is...more

Foley & Lardner LLP

Three Trending Topics in IoT: Privacy, Security, and Fog Computing

Foley & Lardner LLP on

Cisco has estimated that there will be 50 billion Internet of Things (IoT) devices connected to the Internet by the year 2020. IoT has been a buzzword over the past couple of years. However, the buzz surrounding IoT in the...more

Orrick, Herrington & Sutcliffe LLP

Privacy, Security, Risk: What You Missed At IAPP Conference

Earlier this month, privacy and security professionals from around the globe gathered for “Privacy. Security. Risk. 2015”—the second joint conference between the International Association of Privacy Professionals and the...more

Skadden, Arps, Slate, Meagher & Flom LLP

Privacy & Cybersecurity Update - September 2015

Adviser to European Court of Justice Says US-EU Safe Harbor Should Be Declared Invalid - An advisory opinion issued by the advocate general to the European Court of Justice states that the U.S.-EU Safe Harbor should be...more

11 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide