Making Utah the first U.S. state to enact a major artificial intelligence (AI) statute governing private-sector AI usage, on March 13, 2024—coincidentally, the same day the European Parliament adopted the
Continue Reading Utah Enacts First AI-Focused Consumer Protection Legislation in USCybersecurity
Cryptocurrencies and Unclaimed Property: Potential Implications of State Escheat Laws for the Blockchain Technology Industry
This GT Advisory considers the application of state unclaimed property laws to cryptocurrencies, and the potential implications and challenges of such application for both industry participants and state unclaimed property…
Continue Reading Cryptocurrencies and Unclaimed Property: Potential Implications of State Escheat Laws for the Blockchain Technology Industry
Blockchain & Cryptocurrency Newsletter – Winter 2019
2018 was a year of transformation for the blockchain industry. While the market continued to see technological advancements in smart contracts, platform functionality, scalability and security, regulators took a firmer…
Continue Reading Blockchain & Cryptocurrency Newsletter – Winter 2019
Securing EHRs on Mobile Devices According to NCCoE at NIST
After years of collaboration, the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) has published a cybersecurity guide for electronic health record (EHR)…
Continue Reading Securing EHRs on Mobile Devices According to NCCoE at NIST
New German Federal Data Protection Act Officially Published
On 5 July 2017, the new German Data Protection Act (BDSG-new) was officially published in the Federal Gazette. BDSG-new will fully replace the current German Federal Data Protection Act (BDSG)
…
Continue Reading New German Federal Data Protection Act Officially Published
Cloud Migration Demystified
Migration is already underway, but some of the world’s largest organizations are still reluctant. They handle proprietary data and a staggering volume of transactions. They want to marshal information and deliver nuanced results. But a lack of appreciation for the Cloud’s promise, together with questions surrounding security and cost, make many CTOs and COOs cling to legacy systems.
At the surface, the Cloud is seemingly straightforward even for occasional users; using encryption and/or password protection, individuals log on to a website, smartphone app, or similar “thin” interface. They may send an email, manage ‘Internet-of-things’ controls, reserve a seat, store a document, access a data base, or subscribe to an online tool for accounting or lead tracking. While it’s clear that the “back office” intelligence sits someplace else, users probably don’t appreciate the architecture.
Understanding the Cloud’s capabilities and shortcomings is key to a thoughtful migration strategy. Can organizations really save money by replacing their on-premise solutions? How do they comply with regulations around the world addressing the collection, use and transfer of personal data? When migrating, do they retain control of their systems? What about cyber security? Here’s a simplified description for non-technologists!
Rudolph W. Giuliani to Join Greenberg Traurig in New York
Global Firm Makes Major Strategic Moves in Crisis Management, Cybersecurity, White Collar Defense and Investigations
NEW YORK (January 19, 2016) — Former New York City Mayor Rudolph W. Giuliani has…
Continue Reading Rudolph W. Giuliani to Join Greenberg Traurig in New York
No Cybersecurity Crying in ’16
Cyber liability may have been an exotic notion as recently as a couple of years ago. But today, even after notorious breaches, some organizations still don’t appreciate that leaving firewalls…
Continue Reading No Cybersecurity Crying in ’16
Congress Finally Passes the Cybersecurity Act of 2015
After seeking to pass broad private sector cybersecurity legislation for a number of years, Congress finally passed and the President signed into law the Cybersecurity Act of 2015 (Cybersecurity Act).
The Cybersecurity Act makes three key changes in current law. First, it provides explicit authorization for companies to share cyber threat information with each other and the government, as well as receive such information. Second, it authorizes private sector use of defensive measures, and third it provides a safe harbor from liability for sharing the cyber threat or defensive measure information in good faith in compliance with the safeguards required by the legislation.Continue Reading Congress Finally Passes the Cybersecurity Act of 2015