In Part 1 of this two-part series, we discussed some of the Federal Aviation Administration (FAA) requirements for commercial use of unmanned aerial vehicles (also known as UAVs or drones). In this Part 2, we discuss some of...more
Unmanned aerial vehicles (UAVs)—popularly known as drones—have enormous possibilities for use in the business world. In fact, the drone market is expected to exceed $12 billion by 2021. The small size, maneuverability, and...more
California was one of the first states to allow autonomous vehicles (self-driving cars) to be tested on public roads. On April 2, 2018, the state began allowing self-driving cars without a driver in the vehicle to be tested...more
On August 31, the White House released a report developed by the American Technology Counsel (ATC), Office of Management and Budget, Department of Homeland Security, Department of Commerce, and General Services Administration...more
Earlier this month, the United Kingdom’s Information Commissioner’s Office (ICO) released an initial draft guide of contracting requirements and liabilities for data controllers and data processors doing business together...more
Earlier this month, the European Central Bank (ECB) released a draft guide to provide a consistent approach on how to assess fintech credit institution license applications. The guide defines fintech banks as having “a...more
On September 8, 2017, the US Federal Trade Commission (FTC) announced that three US companies have reached a settlement regarding charges that the companies misled consumers in connection with their participation in the EU-US...more
On September 8, 2017, the Federal Communications Commission (FCC) released an order to update and remove regulations that the FCC determined “no longer reflect current requirements or technology” from the Code of Federal...more
On August 17, 2017, Delaware Governor John Carney signed into law an act to amend Title 6 of the Delaware Code relating to breaches of security involving personal information. The amended law and the new obligations it...more
On January 23, the Federal Trade Commission (FTC) released “Cross-Device Tracking: An FTC Staff Report,” which explains how cross-device tracking is used to track consumers across multiple devices, sets out the benefits and...more
On January 3, the Office of Management and Budget (OMB) issued Memorandum M-17-12, which clarifies how federal agencies should prepare for and respond to data security breaches involving personally identifiable information...more
The Dubai International Financial Center (DIFC) is set to launch the FinTech Hive—an accelerator program for developing financial technology (fintech) start-ups and entrepreneurs—in the first quarter of 2017. The FinTech Hive...more
On January 10, the European Commission proposed new legislation that would update and supplement current ePrivacy rules and extend their scope to all providers of electronic communication services.
The following is a...more
1/12/2017
/ Confidential Information ,
Data Privacy ,
Data Protection ,
e-Privacy Directive ,
Electronic Communications ,
EU ,
European Commission ,
General Data Protection Regulation (GDPR) ,
Internet ,
Marketing ,
Spam
On January 3, several US trade associations and internet service providers (ISPs) submitted petitions requesting that the Federal Communications Commission (FCC) reconsider its broadband privacy rules mandating consumer...more
In a recent post, we noted that the US federal government has become increasingly concerned about the security of Internet of Things (IoT) devices. On November 15, the US Department of Homeland Security (DHS) issued guidance...more
The annual State CIO Survey by the National Association of State Chief Information Officers (NASCIO) for 2016 found that the number of states outsourcing their IT applications and services has increased—with two-thirds of...more
Verizon’s annual report investigating data breach information finds that phishing—which it defines as malicious correspondence involving a link or attachment to install malware on the victim’s computer or system—is still the...more
Recent attempted cyberattacks that used Internet of Things (IoT) devices to effect the attempted attacks have led to growing concern within the federal government over the security of such devices and the potential such...more
KPMG reported in a quarterly survey that the global business services (GBS) model (which delivers core business processes such as finance and accounting, human resources, information technology, sourcing and procurement, and...more
UK Secretary of State Karen Bradley recently confirmed that the United Kingdom will implement the European Union’s General Data Protection Regulation (GDPR), the regulation by which the European Commission intends to...more