Tech & Sourcing @ Morgan Lewis

TECHNOLOGY TRANSACTIONS, OUTSOURCING, AND COMMERCIAL CONTRACTS NEWS FOR LAWYERS AND SOURCING PROFESSIONALS
The UK Department for Digital, Culture, Media & Sport (DCMS) recently extended the deadline for responses to a policy paper issued on May 26, 2022, calling for views on UK data storage and processing infrastructure, security, and resilience (the Call for Views). The Call for Views invites contributions from data center operators, cloud platform providers, managed service providers, data center customers, security and equipment suppliers, and cybersecurity experts to better understand the risks associated with data storage and processing services.
In this webinar, partner Mike Pierides and associate Oliver Bell will review developments in the legal and regulatory landscape around the world relating to the development and deployment of artificial intelligence.
The Stanford Institute for Human Centered Artificial Intelligence recently published its AI Index Report 2022. In a world of near-constant advancement and innovation in technology, it’s no surprise the report found that more global artificial intelligence (AI) legislation was proposed in 2021 than ever before.
The Bank of England (Bank) and the UK Financial Conduct Authority (FCA) published their final report of discussions from the UK Artificial Intelligence Public-Private Forum on February 17. Over quarterly meetings and several workshops conducted since October 2020, the Bank and the FCA jointly facilitated dialogue between the public sector, the private sector, and academia in order to deepen their collective understanding of artificial intelligence (AI) and explore how to support the safe adoption of AI. This initiative was incorporated into the UK National AI Strategy.
The Intellectual Property Office (IPO) in the United Kingdom just closed a consultation on policy options for changes to patent and copyright legislation to better protect technology created by artificial intelligence (AI).
Broad awareness has been made about cyberattacks in the form of phishing that typically use email messages to lure victims into divulging sensitive information or opening a link that allows malware to infiltrate their device. Companies have learned how to combat phishing by training employees to recognize such scam attempts and report them as phishing to protect their organizations. “Vishing” is another tactic used by scammers that, while less familiar, is no less invasive and dangerous.