On May 7, 2025, the Utah Artificial Intelligence Policy Act (UAIP) amendments will go into effect. These amendments provide significant updates to Utah’s 2024 artificial intelligence (AI) laws. In particular, the amendments...more
5/9/2025
/ Algorithms ,
Artificial Intelligence ,
Biometric Information ,
Consumer Protection Laws ,
Corporate Counsel ,
Disclosure Requirements ,
Legislative Agendas ,
New Legislation ,
Penalties ,
Regulatory Requirements ,
Software ,
State Privacy Laws ,
Technology Sector ,
Transparency
Novel technologies that seek to improve quality of life or simplify complex processes offer great promise. For example, medical technologies that detect or cure disease or supply chain technologies that allow for real time...more
The proliferation of AI-derived and processed data in the era of big data is occurring against a complex backdrop of legal frameworks governing ownership of and responsibilities with regard to that data. In a previous...more
Machine learning (ML) models are a cornerstone of modern technology, allowing models to learn from and make predictions based on vast amounts of data. These models have become integral to various industries in an era of rapid...more
8/17/2023
/ Artificial Intelligence ,
California ,
California Consumer Privacy Act (CCPA) ,
California Privacy Rights Act (CPRA) ,
Cyber Attacks ,
Cybersecurity ,
Data Privacy ,
Machine Learning ,
Popular ,
Risk Factors ,
State Privacy Laws ,
Technology Sector
California, home to the highest number of registered vehicles in the U.S., is at the forefront of a critical issue – the privacy practices of automobile manufacturers and vehicle technology firms....more
8/2/2023
/ Automotive Industry ,
California Privacy Protection Agency (CPPA) ,
Data Collection ,
Data Privacy ,
Enforcement Actions ,
Manufacturers ,
Motor Vehicles ,
Privacy Laws ,
Proposed Regulation ,
Regulatory Agenda ,
State Privacy Laws ,
Technology Sector
In an era where our lives are ever more intertwined with technology, the security of digital platforms is a matter of national concern. A recent large-scale cyberattack affecting several U.S. federal agencies and numerous...more
6/19/2023
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Cybersecurity Information Sharing Act (CISA) ,
Data Breach ,
Data Transfers ,
Digital Platforms ,
International Data Transfers ,
National Security ,
Popular ,
Ransomware ,
Software ,
Technology Sector
Cyber risks are increasing, and as a result, due diligence inquiries and valuations are increasingly focusing on the cybersecurity and privacy risks inherent in a business’s collection, use, retention and disposal of...more
7/14/2022
/ Acquisitions ,
Board of Directors ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Security ,
Due Diligence ,
Information Technology ,
Investors ,
Mergers ,
Risk Factors ,
Risk Management ,
Technology Sector
Thank you so much for joining us in this interview series! Before we dig in, our readers would like to get to know you. Can you tell us a bit about how you grew up?
I grew up in a small town of about 3,500 in rural North...more
4/18/2022
/ Business Entities ,
Compliance ,
Corporate Governance ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Security ,
Incident Response Plans ,
Internet of Things ,
Popular ,
Technology Sector
Technology is evolving and advancing at a dizzying pace across the globe. Emerging technologies are reimagining everything from how we interact with each other to how we interact with businesses and institutions. Given the...more
7/20/2021
/ Cybersecurity ,
Financial Services Industry ,
FinTech ,
Innovation ,
North Carolina ,
Privacy Laws ,
Proposed Legislation ,
Proposed Regulation ,
Provisional Waiver Applications ,
Regulatory Oversight ,
State and Local Government ,
Technology Sector
Technology and the critical infrastructure that support our personal pursuits and business operations are ripe targets for cyberattacks. In particular, the electrical grid that transmits electricity from its point of...more
1/16/2019
/ Big Data ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Electricity ,
Energy Sector ,
Hackers ,
Information Sharing ,
Popular ,
Power Grid ,
Power Plants ,
Renewable Energy ,
Risk Mitigation ,
Technology Sector ,
Utilities Sector ,
Vendors