As convenient, useful and cool mobile technology and interconnected devices are, they come with risks that remain largely unseen or, worse, ignored. Some pose security risks and privacy risk, like those present in voice-activated devices — especially for children. For manufacturers, they also pose regulatory litigation and insurance risks, especially when children end up using their “smart” products.
- January 01, 2019Jeffrey Higel, Michael Bahar and Mike Nelson
Why Collecting Children's Online Data is a Risk As convenient, useful and cool mobile technology and interconnected devices are, they come with risks that remain largely unseen or, worse, ignored. For manufacturers, they also pose regulatory litigation, and insurance risks, especially when children end up using their "smart" products.
December 01, 2018Jeffrey Higel, Michael Bahar and Mike NelsonCalifornia's Consumer Privacy Act, signed into law earlier this year, follows a growing line of consumer privacy laws, such as the European General Data Protection Regulations (GDPR), Canadian Breach of Security Safeguards Regulations of the Personal Information Protection and Electronic Documents Act (PIPEDA), and related New York Department of Financial Services Cybersecurity Rules and Regulations (NYCRR 500).
December 01, 2018Mark SangsterCompanies Impacted By California's SB-327 — Especially Manufacturers and Distributors of IoT Devices — Should Work to Ensure Compliance With the Act As Soon As Possible If Regulatory Fallout Is to Be Avoided Come January 2020
While a great deal of attention has focused on the California Consumer Privacy Act, California also passed a less-publicized, but highly critical, statute that will regulate certain aspects of Internet of Things device security.
December 01, 2018Michael Bahar, Frank Nolan and Trevor SatnickArtificial intelligence and automation are creeping into the workplace of every industry, bringing the added benefits of efficiency and security. As more organizations implement AI solutions across their departments, businesses still relying on outdated, manual processes will fall behind.
December 01, 2018Rebecca YoderCyber criminals looking for new ways to exploit company networks are turning their focus to the privileged network access given to the many players involved in supply chains. As supply ecosystems grow, and points of vulnerability proliferate, businesses will have to turn to distributed ledger technology.
December 01, 2018Adrian ClarkeIn response to the omnipresent threat of cyberattacks, the ABA issued Formal Opinion 483, which addresses the obligations imposed upon lawyers to safeguard their clients' data. Here's how to achieve compliance.
December 01, 2018Larry J. Hershman and Jeffrey S. BrennerE-discovery presents some special considerations that need to be examined before deciding what is best for your organization and really taking a stand in the on-premises vs. cloud debate.
December 01, 2018Stephen EhrlichThree cases from the summer of 2018 reinforce some of the key themes of recent e-discovery case law
December 01, 2018Mike HamiltonMalibu Media LLC is by now well-known as a frequent filer of copyright infringement lawsuits nationwide against Web users alleged to have illegally downloaded and shared the company's adult films. But a federal judge in Pennsylvania recently said it should be up to a jury to decide whether the company is entitled to stake a claim to those copyrights in the first place.
December 01, 2018Zach Needles











