When two parties engage in a merger or acquisition, there are several processes that must take place before the transaction can be completed, including due diligence of the seller’s assets—and particularly the seller’s relevant and material intellectual property (IP).
Tech & Sourcing @ Morgan Lewis
TECHNOLOGY TRANSACTIONS, OUTSOURCING, AND COMMERCIAL CONTRACTS NEWS FOR LAWYERS AND SOURCING PROFESSIONALS
The German Conference of DPAs (the DSK) has released new (legally non-binding) detailed Guidelines dated February 18, 2022 with respect to direct marketing in Germany.
As technology and the use of the internet continue to evolve, lawmakers remain focused on setting a legal framework for businesses operating “online” in Russia. In 2021, the Russian regulatory landscape underwent significant changes, which will no doubt have an impact on how tech and media companies conduct their business in Russia.
We have heard time and time again that we should not reuse passwords across accounts—if a cybercriminal were to obtain access to the password of one account, they could then use such password to access multiple accounts. This use of stolen passwords and other credentials has led to a rise in credential stuffing attacks. A new guide released this month by New York Attorney General Letitia James investigates the rise in credential stuffing attacks and best practices designed to prevent such attacks.
In our January 2021 blog post The Right to Repair in Massachusetts Rolls Forward, we discussed how Massachusetts voters in November 2021 approved Question One, a ballot initiative amending the commonwealth’s 2012 Right to Repair Law. The amendment provides that motor vehicles sold in Massachusetts, beginning with 2022 models, be required “to equip any such vehicles that use telematics systems—systems that collect and wirelessly transmit mechanical data to a remote server—with a standardized open access data platform. Owners of motor vehicles with telematics systems would get access to mechanical data through a mobile device application.” With authorization of the owner, such telematics data will be available to independent repair facilities and dealerships not otherwise affiliated with the manufacturer of the vehicle, who will “send commands to the vehicle for repair, maintenance, and diagnostic testing.” In turn, a contractual relationship between the manufacturer and the independent repair facility will no longer be required in order for such data to be shared.
According to recent guidance from the US Federal Trade Commission (FTC), providers of health apps and connected devices that collect consumers’ health information must comply with the FTC’s Health Breach Notification Rule, 16 CFR Part 318, and therefore are required to notify consumers and others when their health data is breached.
On June 4, 2021, the European Commission adopted its long-anticipated updated Standard Contractual Clauses (New SCCs) for use by organizations transferring personal data outside of the European Economic Area (EEA) to third countries that do not provide adequate protections in respect of personal data. For more information, read our June 10 LawFlash, New European Standard Contractual Clauses Adopted for International Data Transfers. In this post we look at some of the things that organizations will need to consider when updating their current standard contractual clauses (SCCs).
The United Kingdom’s Department for Digital, Culture, Media & Sport (DCMS) is requesting views on supply chain cybersecurity, which it will look to incorporate into its new National Cyber Security Strategy.
Last week, we posted on the guidance issued by the US Department of Labor (DOL) for plan sponsors, plan fiduciaries, recordkeepers, and plan participants on cybersecurity best practices. Last week’s post focused on the guidance provided for hiring a service provider. In this week’s post, we will highlight some the DOL’s cybersecurity program best practices for use by recordkeepers and other service providers responsible for plan-related IT systems and data.
The US Department of Labor (DOL) recently announced guidance for plan sponsors, plan fiduciaries, recordkeepers and plan participants on cybersecurity best practices. The guidance focuses on three areas: (1) tips for hiring a service provider; (2) cybersecurity program best practices; and (3) online security tips. In this post, we will focus on the DOL’s tips for plan sponsors and plan fiduciaries in selecting a service provider.