Last night, the Senate passed by unanimous consent H.R. 1668, the Internet of Things (IoT) Cybersecurity Improvement Act.
Boston – November 19, 2020 – Cooley advised Boston-based market-leading software companies DataRobot and Klaviyo on their late-stage financings.
McLane Middleton, Professional Association
Accountants are prime targets of cyber crime. You are an enticing target because you possess large quantities of sensitive personal, financial, and tax information highly valuable for identity
Ropes & Gray LLP
On October 8, 2020, the Department of Justice released "Cryptocurrency: An Enforcement Framework" (the "Framework"), setting out risks and enforcement initiatives related to...
There has been a significant amount of hype around cryptocurrencies and blockchain in the last five years, with business to business (B2B) blockchain applications slowly starting to gain traction in leading-edge organizations.
Arnold & Porter
President-elect Biden and Republican congressional leaders will find themselves on the opposite side of several key technology policy issues, including net neutrality, online privacy, ...
Akin Gump Strauss Hauer & Feld LLP
Voters in Massachusetts overwhelmingly approved a ballot initiative that gives independent mechanics greater access to vehicle data, a move that vehicle manufacturers have...
A recent interim rule from the Department of Defense (DoD) would create a new self-assessment methodology for the cybersecurity requirements in NIST SP 800-171.
Ogletree, Deakins, Nash, Smoak & Stewart
In this podcast, Danielle Ochs, Jenn Betts, Bud Bobber, and Simon McMenemy discuss the global shift to remote work as a result of the COVID-19 pandemic.
The Department of Defense's interim rule implementing new cybersecurity requirements for government defense contractors is set to take effect on November 30, 2020.
The legal issues surrounding ownership with regard to inventions and other works created using artificial intelligence (or "AI") are top of mind for various companies.
Foley & Lardner
Darkreading.com reported that "Given the high-tech password retrieval systems in use, it's perhaps no wonder that many users choose passwords that are lack sufficient security heft.
Proskauer Rose LLP
Before the onset of the COVID-19 pandemic, companies were already exploring the promise of blockchain to modernize certain aspects of their supply chains.
The OCC sees holding the cryptographic access keys to control and transfer cryptocurrency as an "electronic corollary" of banking's traditional safekeeping methods.
Burr & Forman LLP
October is cyber-security awareness month, so it's only appropriate that FINRA started it with another Regulatory Notice warning member firms to beware of a false-survey phishing scheme.
Foley & Lardner
Darkreading.com reported that "with online sales predicted to reach $189 billion this year, up 33% over 2019….
The Situation: The requirement for a paper‑based note for issuing securities under the German law has been an obstacle for the use of security tokens in Germany.
Wyatt, Tarrant & Combs
At least 15 SAP Java-based solutions are affected, including the SAP Supply Chain Management, the SAP Enterprise Portal, Central Process Scheduling and other widely used SAP applications.
Wyatt, Tarrant & Combs
On October 28, 2020, the Federal Bureau of Investigation (FBI), the U.S. Department of Health and Human Services (HHS), and the Cybersecurity and Infrastructure Security Agency (CISA) issued a Joint Cybersecurity Advisory.
Gibson, Dunn & Crutcher
The third quarter of 2020 saw a noticeable surge in Artificial Intelligence ("AI")-related regulatory and policy proposals. The European Union ("EU") has emerged as a pacesetter in AI regulation...