The Pennsylvania Bar Institute’s (PBI’s) annual Internet Law Update seminar will be held on March 28, 2017. This year’s seminar was planned by Morgan Lewis partner Peter Watt-Morse, and Morgan Lewis associates Eric Pennesi and Ben Klaber will join Peter on the faculty.
A recent action by the Federal Trade Commission (FTC) against an internet of things (IoT) device manufacturer in the Northern District of California is a significant development in the IoT space and data security law. The action will ultimately test the FTC’s regulatory power over IoT device manufacturers because the complaint is based on alleged security vulnerabilities rather than actual harm to consumers.
By voice vote on February 6, the US House of Representatives passed the Email Privacy Act that would, among other things, require the federal government to obtain a warrant before compelling service providers to hand over emails and other digital communications of customers (read our previous post for helpful background on the act).
The Dubai International Financial Center (DIFC) is set to launch the FinTech Hive—an accelerator program for developing financial technology (fintech) start-ups and entrepreneurs—in the first quarter of 2017.
Morgan Lewis partner Ed Hansen will present at the Orlando Robotic Process Automation (RPA) Congress in Orlando, Florida on January 24 and 25.
As 2016 comes to a close, we have once again compiled all the links to our Contract Corner blog posts, a regular feature of Tech & Sourcing @ Morgan Lewis.
In a recent post, we noted that the US federal government has become increasingly concerned about the security of Internet of Things (IoT) devices. On November 15, the US Department of Homeland Security (DHS) issued guidance to help stakeholders account for security in the development, manufacturing, implementation, and use of IoT devices.
The annual State CIO Survey by the National Association of State Chief Information Officers (NASCIO) for 2016 found that the number of states outsourcing their IT applications and services has increased—with two-thirds of states outsourcing at least some IT infrastructure operations and almost two-thirds using a managed services model for some or all IT operations.
Verizon’s annual report investigating data breach information finds that phishing—which it defines as malicious correspondence involving a link or attachment to install malware on the victim’s computer or system—is still the most successful form of cyberattack. This year, the report analyzed data from almost 100,000 security incidents and more than 3,000 data breaches in 82 countries. The report found that the majority of breaches are from external actors with a financial motive.