Thought leaders from around the world contribute their perspectives on landmark cases, new legislation, and legal perspectives on new technologies, business practices, and civil procedure.
Anna Viladàs Jené
After many years of negotiations, on 27 April 2016, the European Regulation concerning the protection of individuals in respect of the processing of personal data and the free movement of this data (hereafter, “the Regulation”), has finally seen the light of day.
Ricardo Barretto Ferreira da Silva and Camila Taliberti Ribeiro da Silva
A change of paradigm is urgent and requires a robust legislation on personal data protection.
Kelly L. Frey Sr.
It is always important to remember that our world is largely the result of fortunate accidents.
Chad W. King
In Ernest Cline’s dystopian novel "Ready Player One," the world’s population is addicted to a virtual reality game called the OASIS.
Holly K. Towle
One answer is that it’s bleak.
FinTech companies are disrupting traditional financial models—and creating new data privacy concerns.
Kelly L. Frey Sr.
New technologies open up new ways for children to be exploited online. The Children’s Online Privacy Protection Act offers a solution.
Miguel de Almada and Frederico Bettencourt Ferreira from the Portuguese firm discuss their 2019 "Law Firm of the Year" award for Litigation and Arbitration.
The FTC, on Jan. 5, 2017, filed a complaint in the Northern District of California against an IoT device manufacturer and its U.S. subsidiary for failure to take reasonable steps to secure the products that they sell to the United States market.
What are ‘Reasonable Steps’ to Protect Personal Information’? 5 Key Lessons from the Privacy Commissioner’s Determinations
It is important to implement reasonable steps to protect any personal information they hold against misuse, interference, loss, unauthorized access, modification or disclosure.
John P. Hutchins
In most states, there is no general applicable rule of law forbidding one contracting party from waiving all recourse in the event of breach by the other.
Jim Steinberg and Lance McCord
Unlike most traditionally licensed software, cloud solutions also put the customer at risk by transmitting, storing, and processing the customer’s data outside of the customer’s networks.
Kelly L. Frey Sr.
Rather than the cloud being a thing, it is actually a process.
Data breaches have become inevitable. Here’s what you can do to respond.
Frederic M. Wilf
Cloud computing continues to be a powerful and cost-effective means to build a business with international reach.
The primary question will likely come down to whether or not cell phone data and location records are protected interests under the Fourth Amendment.
Aaron George and Laura Jehl
Information technology lawyers weigh in on the question of data ownership following the GDPR's passage.
Potential risks and legal considerations.
Bradley L. Ortman
Last month, the DHS implemented a new rule to systematize its efforts to monitor social media use of intending immigrants and travelers to the United States.
The Privacy Act 1988 (Cth) (Act) has been amended by the Privacy Amendment (Notifiable Data Breaches) Act 2017 (Cth) (the Amending Act). The Amending Act introduces a mandatory data breach notification regime where an “eligible data breach” occurs. The amendments will commence on February 23, 2018, unless they are proclaimed to commence earlier.
An Interview With Bastian Finkel of BLD Bach Langheid Dallmayr, Germany's 2019 "Law Firm of the Year" Winner in Insurance Law
A look at the new European policies changing the insurance landscape in Germany.
Are IoT technologies nice-to-have “apps” or necessary business components?
2019 "Women in the Law" by the numbers.
Corinne E. Atton and April M. Breyer
The March 2017 statistics issued by PTAB report that across all technologies, all challenged patent claims are found patentable in only 19 percent of inter partes review (IPR) final written decisions.
Elizabeth S. Fitch and Theodore M. Schaer
Cybersecurity and the Claims and Litigation Management Alliance’s School of Cyber Claims