The Road to Regulation: Vehicle Service Contracts Explained — Moving the Metal: The Auto Finance Podcast
The Current State of the Holder Rule: Friend or Foe? — Moving the Metal: The Auto Finance Podcast
Podcast - Diamond Alternative Energy, LLC v. EPA: The Intersection of Constitutional and Environmental Law
Driving Digital Security: The FTC's Safeguards Rule Explained — Moving the Metal: The Auto Finance Podcast
Doc Fees Decoded: The Price of Paperwork in Auto Sales — Moving the Metal: The Auto Finance Podcast
The Briefing: The Ninth Circuit Puts the Brakes on Eleanor’s Copyright Claim
Cruising Through Change: The Auto-Finance Industry’s New Era Under Trump Unveiled — The Consumer Finance Podcast
Cruising Through Change: The Auto-Finance Industry’s New Era Under Trump Unveiled — Moving the Metal: The Auto Finance Podcast
Driven by Data: Auto Finance Trends Uncovered - Moving the Metal: The Auto Finance Podcast
Shifting Gears: Adapting to Regulatory Changes in Auto Finance — Moving the Metal: The Auto Finance Podcast
Dialing In: The TCPA and Auto Finance — Moving the Metal: The Auto Finance Podcast
The Future of Auto Dealership Compliance: A Conversation With Tom Kline — Regulatory Oversight Podcast
Loading and Unloading Under GL and Auto Policies: 2024
Driving Towards Greater Transparency and Sustainability in the EV Market with Davide Giacobbe and ScoutIt
Innovation in Compliance: Navigating Risk Management in the Automotive Industry with Tom Kline
Breaking Granite: Understanding New Amendments to the New Hampshire Retail Installment Sales Act — Moving the Metal: The Auto Finance Podcast
Dissecting Oral Arguments in NADA's Challenge to the CARS Rule — Moving the Metal: The Auto Finance Podcast
The FTC and Connecticut Join Forces for Action Against Nissan Dealer
The CARS Rule — Moving the Metal: The Auto Finance Podcast
Navigating Ancillary Products in Auto Finance — The Consumer Finance Podcast
The FTC has issued FAQs for Gramm-Leach-Bliley Act (GLBA) Safeguards Rule compliance by Motor Vehicle Dealers. Here is what you need to know: Step 1: Are you a financial institution? • You are if you either finance (or...more
This monthly report outlines key developments in China’s data protection sector for July. The following events merit special attention: CAC Issues Third Edition of the Data Export Security Assessment Application Guide: On...more
A major cyberattack on Jaguar Land Rover (JLR) has cast a spotlight on the persistent threat of ransomware targeting global corporations. The HELLCAT ransomware group is behind this latest breach, exposing internal documents,...more
Ethical hackers identified an arbitrary account takeover flaw in the administrator portal for Subaru’s Starlink service, which could allow a threat actor to hijack a vehicle through a Subaru employee account. This...more
OEMs may finally get some clarity in the next couple of months about their obligations under Massachusetts and Maine right to repair laws requiring them to provide owners and independent repair facilities access to mechanical...more
As a Rhode Islander, I am a big fan of our former Governor and now Secretary of Commerce, Gina Raimondo. She has always had her eye on the ball of the rapidly developing data privacy and cybersecurity risks and threats to...more
Powerful ideas emerge when you look at something through a completely different lens. And when two parties come together to share those unique perspectives? That’s when the magic happens. Womble Bond Dickinson’s virtual...more
When I reflect on the relationship that our firm has with our clients, I’m most proud of the fact that you can always count on us. That often means defending complex litigation, steering you through regulatory threats,...more
Automotive dealers and their service providers should take note of an important key difference between the California Consumer Privacy Act (CCPA) and other recent state privacy laws designed to protect consumer information....more
Join Mitratech & Escrypt in this electrifying new webinar on strengthening cybersecurity maturity. As local and global automotive cybersecurity regulations, standards, and guidelines increase in complexity, organizations are...more
China’s legal framework around data protection and security is governed broadly by three key pieces of legislation: the Cybersecurity Law, which came into effect in 2017, and the Data Security Law (DSL) and the Personal...more
Based on China’s Cybersecurity Law (effective from June 1, 2017), the latest draft of Personal Information Protection Law and draft of Data Security Law, the new draft regulations would apply not only to automobile producers...more
This summer, several automakers, including Tesla, Toyota, General Motors, Ford, and Volkswagen learned that their closely held trade secrets were readily available on the internet. The source? An unprotected back-up server....more
• Limited access to autonomous vehicle operations data remains a key barrier to insurance companies’ development of adaptive insurance policies. • Representatives from the insurance industry support federal regulation of...more
The U.S. Environmental Protection Agency was created in 1970 to safeguard the environment against pollutants. The tidal wave of environmental regulations that followed impacted every industry in the United States, especially...more
• California’s new regulations lay out the requirements for manufacturers to obtain permits to test and deploy autonomous-vehicles on public roads. The regulations enable manufacturers to test fully driverless vehicles and...more
The Energy & Commerce Committee of the U.S. House of Representatives held a hearing on October 21st titled “Examining Ways to Improve Vehicle and Roadway Safety” to consider (among other matters) Vehicle Data Privacy...more
Not coincidentally, on July 21, 2015, Wired Magazine published an article with groundbreaking evidence of hacking a car wirelessly, and Senators Edward Markey (D-Mass.) and Richard Blumenthal (D-Conn.) introduced legislation...more
Twelve automakers that make up the Alliance of Automobile Manufacturers (AAM) have agreed to form an information sharing and analysis center (Auto ISAC) that will facilitate the sharing of cyber security data to stay abreast...more