Thought leaders from around the world contribute their perspectives on landmark cases, new legislation, and legal perspectives on new technologies, business practices, and civil procedure.
The FTC, on Jan. 5, 2017, filed a complaint in the Northern District of California against an IoT device manufacturer and its U.S. subsidiary for failure to take reasonable steps to secure the products that they sell to the United States market.
Holly K. Towle
One answer is that it’s bleak.
What are ‘Reasonable Steps’ to Protect Personal Information’? 5 Key Lessons from the Privacy Commissioner’s Determinations
It is important to implement reasonable steps to protect any personal information they hold against misuse, interference, loss, unauthorized access, modification or disclosure.
Kelly L. Frey Sr.
It is always important to remember that our world is largely the result of fortunate accidents.
Chad W. King
In Ernest Cline’s dystopian novel "Ready Player One," the world’s population is addicted to a virtual reality game called the OASIS.
FinTech companies are disrupting traditional financial models—and creating new data privacy concerns.
Ricardo Barretto Ferreira da Silva and Camila Taliberti Ribeiro da Silva
A change of paradigm is urgent and requires a robust legislation on personal data protection.
Anna Viladàs Jené
After many years of negotiations, on 27 April 2016, the European Regulation concerning the protection of individuals in respect of the processing of personal data and the free movement of this data (hereafter, “the Regulation”), has finally seen the light of day.
Sarah E. Coyne
The privacy and security regulations under HIPAA have evolved into a long and winding regulatory road with more hurdles to come, as some of the rules are not yet promulgated.
Information technology lawyers weigh in on the question of data ownership following the GDPR's passage.
The Privacy Act 1988 (Cth) (Act) has been amended by the Privacy Amendment (Notifiable Data Breaches) Act 2017 (Cth) (the Amending Act). The Amending Act introduces a mandatory data breach notification regime where an “eligible data breach” occurs. The amendments will commence on February 23, 2018, unless they are proclaimed to commence earlier.
Bradley L. Ortman
Last month, the DHS implemented a new rule to systematize its efforts to monitor social media use of intending immigrants and travelers to the United States.
The primary question will likely come down to whether or not cell phone data and location records are protected interests under the Fourth Amendment.
Kelly L. Frey Sr.
New technologies open up new ways for children to be exploited online. The Children’s Online Privacy Protection Act offers a solution.
Aaron George and Laura Jehl
Elizabeth S. Fitch and Theodore M. Schaer
Cybersecurity and the Claims and Litigation Management Alliance’s School of Cyber Claims
What improvements do art buyers want to see in the future when it comes to resolving art disputes?
Residential Security Deposits Provide Protection for a Landlord, but There can be Unexpected Pitfalls
Sander A. Rikleen
On tenant’s counterclaims, the court found that landlord had violated the security deposit statute by failing to provide tenant with a receipt acknowledging acceptance of the deposit, and failing to pay interest earned on the deposit over the multi-year tenancy.
Jim Steinberg and Lance McCord
Unlike most traditionally licensed software, cloud solutions also put the customer at risk by transmitting, storing, and processing the customer’s data outside of the customer’s networks.
Miguel de Almada and Frederico Bettencourt Ferreira from the Portuguese firm discuss their 2019 "Law Firm of the Year" award for Litigation and Arbitration.
Frederic M. Wilf
Cloud computing continues to be a powerful and cost-effective means to build a business with international reach.
Insurance Coverage to Protect the Health Care Industry from the Increasing Risks Associated with the Internet of Things
Meghan Magruder and Amy Dehnel
While this connectivity can provide great benefits to patients and physicians, the security issues inherent in these devices are critical.
Potential risks and legal considerations.
John P. Hutchins
In most states, there is no general applicable rule of law forbidding one contracting party from waiving all recourse in the event of breach by the other.
Kelly L. Frey Sr.
Rather than the cloud being a thing, it is actually a process.
Catherine M. Brennan and Nora R. Udell
The fintech revolution has spurred a host of legal questions concerning online lending. Developments at both the federal and state level are beginning to provide some answers.