In an era when data is everything, everywhere, all at once and computation has almost no limit, ensuring privacy while leveraging data analytics is paramount. The US Department of Commerce’s National Institute of Standards...more
In June 2025, cybersecurity researchers discovered a leak of 16 billion passwords in one of the largest data breaches ever, impacting a wide range of platforms and placing billions of users’ information at risk. This incident...more
Going beyond the basics of artificial intelligence (AI), it is important to focus on the data. How data is used, managed, and understood in the context of AI has become the center of many legal and business conversations,...more
Our technology transactions, outsourcing, and commercial contracts team on October 30, 2024 held its annual industry summit in New York. The theme this year was Unleashing the Potential of Technology, with a focus on...more
The United Kingdom’s Information Commissioner’s Office and data protection authorities from Canada, Australia, Hong Kong, Mexico, Switzerland, Norway, New Zealand, Colombia, Jersey, Morocco, and Argentina have released a...more
As part of our Spotlight series, Dion Bregman (who wears many hats at Morgan Lewis, such as deputy leader of the firm’s intellectual property practice, leader of the firm’s Patent Trial and Appeal Board (PTAB) team, managing...more
In the digital health market, new trends reveal future opportunities for innovators and shape healthcare investors’ strategies. Trends for 2022 include regulatory developments regarding digital health, telehealth expansion,...more
2/25/2022
/ Centers for Medicare & Medicaid Services (CMS) ,
Cybersecurity ,
Data Protection ,
Digital Health ,
Federal Trade Commission (FTC) ,
Food and Drug Administration (FDA) ,
Health Care Providers ,
Health Information Technologies ,
Life Sciences ,
Medical Devices ,
Pharmaceutical Industry ,
Popular ,
Regulatory Oversight ,
Telehealth ,
Telemedicine
Through legislation, Connecticut has incentivized businesses to conform to one or more industry recognized cybersecurity frameworks. As we recently discussed, cybersecurity incidents and risks are taking centerstage. Under...more
In Part 1 of this series, we looked at the prevalence of standalone data processing addendums (DPAs) as a means to comply with rules on engaging third-party outsourcers under the EU General Data Protection Regulation (GDPR)....more
Although the EU’s General Data Protection Regulation (GDPR) has been in force for more than six months, many organizations are still getting to grips with some of the practical requirements, including ensuring that their...more