Latest Posts › Cybersecurity

Share:

Lawyers Using Math? Understanding and Implementing Differential Privacy for Big Data

In an era when data is everything, everywhere, all at once and computation has almost no limit, ensuring privacy while leveraging data analytics is paramount. The US Department of Commerce’s National Institute of Standards...more

Navigating the 2025 Cybersecurity Landscape: Data Breaches, Rising Costs, and CISA’s Evolving Role

In June 2025, cybersecurity researchers discovered a leak of 16 billion passwords in one of the largest data breaches ever, impacting a wide range of platforms and placing billions of users’ information at risk. This incident...more

As Data Centers Grow, So Do Their Legal Challenges

A new Insight published by our Morgan Lewis colleagues highlights the complex legal landscape data centers face in the United States, particularly concerning cybersecurity, privacy, and national security. Cybersecurity...more

2024 Tech Sourcing Summit: A Summary

Our technology transactions, outsourcing, and commercial contracts team on October 30, 2024 held its annual industry summit in New York. The theme this year was Unleashing the Potential of Technology, with a focus on...more

Extracting Lessons from the Joint Statement on Data Scraping and Protection of Privacy

The United Kingdom’s Information Commissioner’s Office and data protection authorities from Canada, Australia, Hong Kong, Mexico, Switzerland, Norway, New Zealand, Colombia, Jersey, Morocco, and Argentina have released a...more

UK Government Publishes Interim Report on AI Governance

In an age marked by remarkable advancements in artificial intelligence (AI), the question of how to effectively govern this rapidly evolving technology has become increasingly pressing. On August 31, 2023, a significant...more

Metaverse Health: A Chance to Respawn Data Interoperability, Privacy, and Security

As we all try to keep up with the Metaverse and as the healthcare system wilts under a data deluge, the convergence of realities in a shared online space is not merely a chance for practitioners and patients to find each...more

An Immersive Conversation with Dion Bregman on the Metaverse

As part of our Spotlight series, Dion Bregman (who wears many hats at Morgan Lewis, such as deputy leader of the firm’s intellectual property practice, leader of the firm’s Patent Trial and Appeal Board (PTAB) team, managing...more

Digital Health Trends to Watch in 2022

In the digital health market, new trends reveal future opportunities for innovators and shape healthcare investors’ strategies. Trends for 2022 include regulatory developments regarding digital health, telehealth expansion,...more

Proactive Businesses May Find Protection Under Connecticut Cybersecurity Act

Through legislation, Connecticut has incentivized businesses to conform to one or more industry recognized cybersecurity frameworks. As we recently discussed, cybersecurity incidents and risks are taking centerstage. Under...more

Phishing for Force Majeure – What’s the Catch?

With the recent onslaught of ransomware attacks, it’s time to revisit force majeure clauses (again). Earlier in the pandemic, we reviewed how COVID-19 could impact force majeure provisions. Since then, there has been a flurry...more

Retirement Plan Cybersecurity: Don't Assume Outsourced Administration Is Duty Free

For years, there has been a persistent trend toward outsourcing retirement plan recordkeeping and other administrative responsibilities. Although historically more prevalent for defined contribution plans, this outsourcing...more

Contract Corner: Model Data Access Agreement to Foster Fintech Growth

The Clearing House (the oldest banking association and payments company in the United States) recently released a model agreement as a voluntary starting point to facilitate data sharing between financial institutions and...more

Autonomous Vehicle Cybersecurity: What’s on Our LiDAR?

The importance of cybersecurity in the autonomous vehicle setting is well known, but nuance and complexity will be on our LiDAR (a pulsed laser that measures ranges) where the rubber meets the road....more

Contract Corner: Data Commons (Part 2 – The Approach)

In Part 1 of this series, we provided an overview of data (or knowledge) commons and some key issues to consider, but how does one actually create and manage a data commons? To find your feet in this budding field, build on...more

Contract Corner: Data Commons (Part 1 – The Framework)

You may have heard of the “tragedy of the commons,” where a resource is depleted through collective action, but knowledge is different from other resources—knowledge can be duplicated, aggregated, integrated, analyzed,...more

FTC Enforcement of COPPA for Internet of Things Reaches Flashpoint

Galvanized by a confluence of charged factors—like privacy, cybersecurity, children, and the Internet of Things (IoT)—and sparked by recent assertions of Children’s Online Privacy Protection Act (COPPA) regulatory power, the...more

Illinois Court Says Biometrics Plaintiffs Must Put a Finger on Alleged Harm

The Illinois Biometric Information Privacy Act (IBIPA) has been grabbing headlines of late as class action lawsuits under IBIPA’s private right of action are piling up, but an Illinois state appeals court recently held that a...more

Navigating the IoT Workplace Quagmire

The Internet of Things (IoT) promises a societal transformation based on a virtuous circle of constantly improving connectivity, integration, data, intelligence, and automation. One important element of this transformation is...more

Cybersecurity Bill Aims to Patch Holes in Main Street

The US Senate Commerce Committee recently advanced a bill, titled the MAIN STREET Cybersecurity Act of 2017 (the Bill), under which the National Institute of Standards and Technology (NIST) would disseminate “clear and...more

20 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide