Technology Blog
From token generation events and drone regulation to the latest developments in privacy and data security compliance, our Technology Industry Blog focuses on the still-evolving regulatory landscape for companies developing new products and services, as well as those for whom technology figures prominently into their day-to-day operations.
Many of our contributors are IAAP-certified privacy professionals or hold advanced STEM degrees, with prior experience working as systems engineers and software developers. As a result, our blog offers that rare coupling of legal insight and technical sophistication, making it a true resource for businesses operating at the bleeding edge, where reliable legal intel can prevent project delays as well as civil and criminal exposure.
Recent Blog Posts
April 26, 2022 | Blogs
Blockchain. Does it protect personal privacy? Is it a tool that can evade the law? How should we thi...
April 19, 2022 | Blogs
On March 31, 2022, the United States District Court for the Southern District of New York dismissed ...
March 31, 2022 | Blogs
Japan’s Act on the Protection of Personal Information (APPI) becomes effective on April 1, 2022. T...
In the News:
Connected Vehicles & Automatic Decision-MakingPublication: Bloomberg Law
Publish Date: March 24, 2022
March 21, 2022 | Blogs
The Life of an Outsourced DPO The data protection laws of the European Union require many European a...
March 18, 2022 | Blogs
In recent years, online crowdfunding platforms such as Kickstarter, Indiegogo, and GoFundMe have eme...
March 11, 2022 | Publications
The Utah legislature recently passed the Utah Consumer Privacy Act (UCPA). UCPA is a comprehensive p...
March 9, 2022 | Blogs
President Biden issued an Executive Order (the “Order”) earlier outlining the administration’s...
March 1, 2022 | Blogs
The increased popularity of non-fungible tokens (NFTs) has potential to inspire new methods of creat...
February 17, 2022 | Blogs
Hacking – it gets a bad rap. For good reason. It’s associated with bad actors who infiltrate an ...
February 11, 2022 | Blogs
India is about to enact a far-reaching Data Privacy Law. Expected to be passed by April 2022 and in ...
January 28, 2022 | Blogs
Does a Privacy Apocalypse Draw Near? Quantum computing – some view its emergence as heralding the ...
January 28, 2022 | Blogs
Data Privacy Detective Podcast · Top 5 Tracks – Data Privacy Day 2022 Top 5 Tracks ...
January 24, 2022 | Blogs
Backup – what does it have to do with protecting data privacy? And how does a backup service work?...
January 18, 2022 | Blogs
Taiwan occupies a unique geopolitical position – with a substantial population and robust economy,...
January 5, 2022 | Blogs
Turkey is the first 2022 stop on our global tour about data localization. What is Turkey’s approac...
December 27, 2021 | Blogs
The Data Privacy Detectives turns his data localization spotlight on the island nation of Singapore....
December 6, 2021 | Blogs
Our prior podcast episodes detailed how China, Russia, and to a lesser extent India have created bar...
November 9, 2021 | Blogs
We turn to Russia in our data localization series. Russia’s 2015 personal data protection law requ...
November 2, 2021 | Blogs
In this second podcast episode about data localization, we spotlight India. Since 1993 the world’s...
October 21, 2021 | Blogs
The internet and the worldwide web – the words envision a global communications system that transc...
September 30, 2021 | Blogs
Home is our private place. But in the digital age, how private are our homes? And what can we do to ...
September 1, 2021 | Blogs
Kentucky is perhaps the first state to adopt a comprehensive anti-doxing statute that creates a civi...
August 30, 2021 | Blogs
Mike Potter’s cat bounced on his keyboard years ago. His hard drive cratered, and he lost his data...
August 2, 2021 | Blogs
The state of Wyoming made headlines when its legislature approved a first-of-its-kind bill[1] that g...
July 28, 2021 | Blogs
Ransomware. It’s in the headlines. It’s digital organized crime across borders. When an organiza...
July 20, 2021 | Blogs
This article was originally published on July 19, 2021 in Westlaw Today, an imprint of Thomson Reut...
July 8, 2021 | Blogs
Ransomware attacks, data breaches, digital theft – on the rise. Who are the cyber-criminals? Can t...
July 1, 2021 | Blogs
On June 28, 2021, the Europe Union granted two adequacy decisions to the United Kingdom for personal...
June 2, 2021 | Publications
Industry analysts and business consultants have agreed for some time that connected mobility is the ...
May 18, 2021 | Publications
In today’s world of ever-expanding technology, the evolution of autonomous vehicles from theory, t...
May 14, 2021 | Blogs
In order to keep up with a changing world, each company must periodically assess how technological c...
May 10, 2021 | Blogs
This is a true story of a phone scam of May 2021. The Data Privacy Detective got a call on the home ...
May 3, 2021 | Blogs
This podcast episode explores ransomware from preventive, legal, and communications angles. While th...
April 22, 2021 | Publications
There is a growing trend in support of “right to repair” laws requiring manufacturers to make th...
April 9, 2021 | Blogs
On April 5, the U.S. Supreme Court found that Google’s copying of Oracle code was fair use, puttin...
April 2, 2021 | Blogs
Janus was the Roman god of doors, gates, and transitions. He needed two faces to look in both direct...
March 29, 2021 | Blogs
Kentucky has long been considered a national leader in the manufacturing industry given its low cost...
March 25, 2021 | Blogs
Facial recognition. It’s a hot topic. Targeting, misidentification, and doxing – the dangers...
March 18, 2021 | Blogs
Distributed ledger technologies (DLTs) are becoming more prominent with applications across supply c...
March 15, 2021 | Publications
The automotive industry continues to evolve, especially in how intellectual property is developed an...
February 17, 2021 | Blogs
Challenges from Europe and America On February 16, 2021 TikTok was sued in Europe for abusing consum...
February 11, 2021 | Publications
Blockchain technology, best known as the distributed ledger platform that powers Bitcoin and other c...
January 28, 2021 | Blogs
Data theft set new records in 2020. The major causes are not failures of equipment, software, or ser...
January 12, 2021 | Blogs
Data theft set new records in 2020. The major causes are not failures of equipment, software, or ser...
January 8, 2021 | Publications
More than 5,300 companies in the United States used the EU-US Privacy Shield Framework for the tra...
January 5, 2021 | Blogs
As businesses move into 2021, what insurance can they have to limit cyber risk? What does cyber insu...
December 22, 2020 | Blogs
Taiwan is one of the “Four Asian Tiger” economies. Its companies hold 66% of the world’s semic...
December 21, 2020 | Blogs
How a community can responsibly gather, process and use personal information to meet its needs and m...
December 4, 2020 | Blogs
Respecting individual privacy while achieving reliable databases. We all value privacy – at least ...
November 9, 2020 | Blogs
With the passing of Proposition 24 in California, privacy rights are being amended again to close wh...
November 5, 2020 | Blogs
Ransomware – a sinister type of cyberattack that installs malware onto a computer system. Once...
October 26, 2020 | Blogs
Science and knowledge advance through information gathered, organized, and analyzed. It is only thro...
October 5, 2020 | Blogs
The current COVID-19 crisis has increased the importance of online services that provide access to h...
October 1, 2020 | Blogs
The Impact on Privacy From a Digital Healthcare Initiative COVID-19 has changed the world in dramati...
September 25, 2020 | Blogs
Brazil’s General Personal Data Protection Law or “LGPD” entered into force on September 18, 20...
September 1, 2020 | Blogs
Robo-calls, phishing, identity theft, ads we didn’t ask for – and worse. How does this happen? H...
August 20, 2020 | Blogs
A July 2020 Indian Government Report calls for regulation of Non-Personal Data. Most data privacy la...
August 7, 2020 | Blogs
Cloud computing offers a business the prospect of efficiency and savings by improving data storage c...
July 31, 2020 | Blogs
On June 30, 2020 China enacted a National Security Law applicable in Hong Kong. The UK and USA gover...
July 27, 2020 | Blogs
Be Smart The pandemic has forced many more employees to work from home. While working remotel...
July 24, 2020 | Blogs
On July 22, 2020, the Office of the Comptroller of the Currency (“OCC”) released Interpretative ...
July 24, 2020 | Blogs
Effective July 15, 2020, Kentucky statutorily empowered its first “Blockchain Technology Working G...
July 17, 2020 | Blogs
More than 5,300 companies in the United States using the EU-US Privacy Shield Framework for the tran...
July 6, 2020 | Blogs
Colombia made personal privacy a fundamental right in its 1991 Constitution. A 2008 law protected pe...
June 26, 2020 | Blogs
Every year approximately $600 billion, or 1% of the global gross domestic product, is lost through c...
June 4, 2020 | Blogs
On June 1, Attorney General Becerra submitted final proposed regulations to the California Consumer ...
June 3, 2020 | Blogs
A federal district court in In re: Capital One Customer Data Security Breach Litigation recently ...
May 21, 2020 | Blogs
Often seen as a region with a common language and similar cultural traditions, Latin America is, in ...
May 6, 2020 | Coronavirus Response Team
In this unfamiliar time, innovative solutions are being rapidly developed in the technology industry...
May 4, 2020 | Blogs
Newly published federal rules will now give more power to consumers in controlling their personal he...
April 24, 2020 | Coronavirus Response Team
There are several ways startups raise funding – one of the most prevalent is a convertible note. A...
March 26, 2020 | Coronavirus Response Team
Embracing both patents and patented technology may advance the fight against COVID-19. In Italy, the...
March 23, 2020 | Blogs
As the coronavirus continues to quickly spread across the United States, employers are following CD...
March 12, 2020 | Publications
On March 11, California Attorney General Becerra, through the California Department of Justice, rele...
March 10, 2020 | Blogs
Customedia v. Dish is a simple looking case. The patentee asserted claims for a computer implement...
March 9, 2020 | Blogs
Bankers in the fintech space are familiar with the FFIEC’s Guidance recommending multi-factor auth...
February 12, 2020 | Publications
Barely a month into the new year and nine states have already introduced their own version of compre...
February 10, 2020 | Blogs
On Friday, February 7, California Attorney General Becerra released proposed modifications to the dr...
January 31, 2020 | Blogs
The United Kingdom (UK) has formally withdrawn from the European Union (EU) effective January 31, 20...
January 7, 2020 | Blogs
Governmental officials and cyber security experts currently anticipate that Iran’s responses to re...
January 6, 2020 | Publications
Businesses have more than the California Consumer Privacy Act (CCPA) to worry about in 2020 when it ...
December 23, 2019 | Blogs
California’s Consumer Privacy Act goes live on January 1, 2020. It forces businesses beyond...
November 18, 2019 | Blogs
Medical data are considered particularly sensitive personal information. Laws and regulations in...
October 15, 2019 | Blogs
Frost Brown Todd member John Wagster was recently featured in an article by CoinTelegraph about bloc...
September 17, 2019 | Blogs
Friday, Sept. 13 was the last day for bills amending the California Consumer Privacy Act (CCPA) and ...
August 16, 2019 | Blogs
A federal court in California handed Delta Air Lines a win this year by dismissing a putative class ...
August 15, 2019 | Blogs
States across the U.S. are rapidly passing new consumer privacy laws. This is the second in an ongoi...
July 10, 2019 | Blogs
Substantive Expertise versus A New Perspective and Freedom from the Past Counsel are regularly and a...
July 8, 2019 | Blogs
As the scale of solar energy projects grows, the incorporation of advanced direct current (DC) monit...
July 5, 2019 | Blogs
Background Blockchain technology’s potential for disintermediation in the financial sphere has evo...
June 13, 2019 | Blogs
In Dept. of Labor v. McConnell, the Georgia Supreme Court affirmed that an individual could not pur...
May 14, 2019 | Blogs
As we roll into 2019’s peak travel season, automakers are hitting the gas on developing the necess...
May 13, 2019 | Blogs
The May 2-3, 2019 International Association of Privacy Professionals (IAPP) Conference featured lead...
April 30, 2019 | Blogs
Fifty years ago, auto manufacturing plants were filled with thousands of people on large assembly li...
April 30, 2019 | Blogs
Picture frontline employees – like those at a motel’s front desk. In enter ICE agents with gold ...
April 15, 2019 | Blogs
The practical effect of the GDPR in connection with domain name enforcement can leave (and should le...
April 11, 2019 | Blogs
The California Consumer Privacy Act (CCPA) goes into effect on January 1, 2020. Before then, covered...
March 7, 2019 | Blogs
Businesses that violate the CCPA can face civil penalties in actions brought by the California Attor...
March 4, 2019 | Blogs
The CCPA can apply to businesses located outside California that collect or sell personal informatio...
March 4, 2019 | Blogs
Data incidents arise regularly for businesses. The perpetrators range from sophisticated scoundrels ...
February 19, 2019 | Blogs
On December 28, 2018, the former Michigan Governor, Rick Snyder, signed into law House Bill 6941 (th...
January 4, 2019 | Blogs
The European Commission issued its second review of how the EU PrivacyShield is working in late Dece...
November 6, 2018 | Blogs
“The internet is growing less free around the world, and democracy itself is withering under its i...
October 1, 2018 | Blogs
In recent years, cryptocurrencies, such as Bitcoin, Ripple, Ethereum, and Kin, have brought a flur...
September 21, 2018 | Blogs
TL;DR: Drone services companies need to get their drone operators to sign intellectual property as...
September 5, 2018 | Blogs
Have you heard about the California Consumer Privacy Act (CCPA) that recently passed and goes into...
August 9, 2018 | Blogs
On Friday, August 3, Governor Kasich signed Ohio Senate Bill 220, which acknowledges for the first t...
July 30, 2018 | Blogs
The European Union’s General Data Protection Regulation (GDPR), effective as of May 25, 2018, ...
July 26, 2018 | Blogs
When Congress enacted the Communications Decency Act of 1996, the internet was an infant. Prevaili...
July 9, 2018 | Blogs
“California passes strictest online privacy law in the country,” trumpeted CNN Tech on...
June 18, 2018 | Blogs
Businesses not located in the European Union have tried to understand whether the General Data Pro...
June 1, 2018 | Blogs
It’s June 1, 2018, one week after the General Data Protection Regulation of the European Union bec...
May 16, 2018 | Blogs
GDPR, the European Union’s effort to protect personal data, has dominated the efforts of businesse...
April 26, 2018 | Blogs
In our prior podcast, the Data Privacy Detective explored how non-EU businesses can determine if t...
April 19, 2018 | Blogs
In this and the next podcast, the Data Privacy Detective turns a magnifying glass to how businesse...
April 18, 2018 | Blogs
On April 17, 2018, New York Attorney General Eric T. Schneiderman (the “NY AG”) launched...
April 17, 2018 | Blogs
The European Union’s General Data Protection Regulation, the GDPR, becomes directly applicab...
April 10, 2018 | Blogs
The EU’s GDPR – the General Data Protection Regulation – becomes law on May 25, ...
April 9, 2018 | Blogs
In this fourth podcast about the General Data Protection Regulation that becomes law in the Europe...
April 2, 2018 | Blogs
Businesses collect, use and store personal data. It’s unavoidable. An email address, phone n...
March 29, 2018 | Blogs
The General Data Protection Regulation – the GDPR - becomes law throughout the European Unio...
March 26, 2018 | Blogs
On May 25, 2018 the European Union’s General Data Protection Regulation becomes law – ...
December 18, 2017 | Blogs
SEC issues cease-and-desist order two days into the Munchee ICO, a sign the Commission is inchi...
December 11, 2017 | Blogs
This is the second article in a series on the legal issues surrounding artificial intelligence (AI...
November 21, 2017 | Blogs
Full webinar about legal issues surrounding AI. This is the first article in a series on the l...
August 25, 2017 | Blogs
In this podcast, the Data Privacy Detective talks about tech support scams with Michael Severini, ...
August 9, 2017 | Blogs
IoT – the Internet of Things – is the interconnection of physical objects and data. Sm...
August 3, 2017 | Blogs
Phishing is an effort by cybercriminals to use bait in the guise of a familiar email address to ho...
July 28, 2017 | Blogs
On July 25, 2017, the FBI issued a TLP:AMBER alert on its Cyber Watch system about an elaborate cy...
May 4, 2017 | Blogs
The practice of law is going to look very different 15 years from now. The most routine legal work...
December 1, 2016 | Blogs
The Data Privacy Detective met with Ken Morris, lawyer, technologist and founder of KnectIQ, to di...
November 28, 2016 | Blogs
In late October 2016, the Data Privacy Detective met with Joe Tomain, a visiting lecturer at India...
November 22, 2016 | Blogs
An Excerpt from when the Data Privacy Detective sat down with Julia Montgomery to discuss data pro...
November 4, 2016 | Blogs
Initial coin offerings (ICOs) are garnering substantial attention as investors hope their digital ...
October 17, 2016 | Blogs
I attend conferences of our international law firm network MULTILAW. It’s a gathering of law...
October 13, 2016 | Blogs
It seems like everyone is discussing “blockchain,” but few have taken the time to real...
October 10, 2016 | Blogs
The word “computer” was once an occupational classification. Computers were workers wh...
October 9, 2016 | Blogs
I spoke about America’s approach to data privacy at a recent Conference at the European Cour...
October 7, 2016 | Blogs
Privacy is dead, get over it. This is what a blockchain entrepreneur told a Conference at the Euro...