Privacy and Suffering Under the IoT Bodhi Tree
The cyber-savvy Bodhisvatta understood fear, response and recovery and was therefore unmoved by Mara’s frightening cyber army, so the Internet … Continue reading Privacy and Suffering Under the IoT...
View ArticleHow to Do Vendor Contracts When the Intent of Individual Customers Matters
Before the Internet of Things, the Internet was and is a jungle of context-free adhesion contracts. There’s you, alone, and … Continue reading How to Do Vendor Contracts When the Intent of Individual...
View ArticleHow Safe Harbor’s Death Empowers Non-Europeans and Spawns Innovation
Many have recognized that the recent decision by the European Court of Justice (ECJ) on Safe Harbor and the flight … Continue reading How Safe Harbor’s Death Empowers Non-Europeans and Spawns...
View ArticleSafe Harbor II: The Sequel Will Be Better than the Original
The announcement by European Justice Commissioner Vera Jourova of an “agreement in principle” on a new data transfer pact with … Continue reading Safe Harbor II: The Sequel Will Be Better than the...
View ArticleHappy 2016! A New Open Source Data Law Blog for Data’s Big Year
Happy 2016, in which new privacy legal rights emanating from Europe and complex interplay between data value, privacy, security, terror … Continue reading Happy 2016! A New Open Source Data Law Blog...
View ArticleSwarming Regulation of Personal Data in the US Tech Sector
Sectoral regulation of privacy and information security in the United States has created a complex system for tech innovation, because … Continue reading Swarming Regulation of Personal Data in the US...
View ArticleWhat is Your Plan for the War of the Data Worlds?
The Battleground Seen from the Two Worlds Global organizations need a resilient strategy and actionable plans for dealing with the … Continue reading What is Your Plan for the War of the Data Worlds? →...
View ArticleProtecting Knowledge Assets: Wearable Tech
By Candice Decaire and Dario Machleidt The IoT in general, and wearable tech in particular, make the protection of “knowledge … Continue reading Protecting Knowledge Assets: Wearable Tech → The post...
View ArticleCybersecurity to Protect Knowledge Assets — Study with Ponemon
New Study Reveals that Companies Are Unprepared to Protect What Matters Most to Them How are you protecting your crown … Continue reading Cybersecurity to Protect Knowledge Assets — Study with Ponemon...
View ArticleCyber Winter is Here, and Coming to Regulation: New York’s Cybersecurity Rule...
Authors: Jon Neiditz and Julie Grundman The State of New York’s response to two large cybersecurity breaches may fuel the transformation … Continue reading Cyber Winter is Here, and Coming to...
View Article
More Pages to Explore .....