Manufacturing Technologies
New privacy regulations along with new sets of guidelines in relation to the principle of “privacy by design” require thorough implementation in a company’s terms and conditions, reporting, and elsewhere. A secure communication management framework, such as the e-ID concept, is needed to comply with EU regulatory requirements, for example.
As automation propels big data, we help our clients develop effective solutions for protecting and managing information assets and complying with data protection law, including the preparation of expert opinions regarding data protection issues, drafting data protection guidelines, assisting with the appointment of data protection supervisors, and settling data protection issues in connection with compliance investigations.
Cyber threats are a growing concern for manufacturers of all sizes. Most manufacturers are critical infrastructure organizations with automated processes, intellectual property, and other sensitive information that may be vulnerable to cyber attacks. We help manufacturers prevent and deter attacks, pursue perpetrators, and mitigate risk and loss. Our team includes members with extensive experience in public policy, cyberforensic investigations, Internet tracking, rapid response, and insurance coverage.
Thought Leadership
On 30 January 2024, the US Citizenship and Immigration Services (USCIS) published a final rule (Final Rule) increasing the premium processing fee from US$2,500 to US$2,805, increasing filing fees for I-129 and I-140 employment-based petitions, and imposing a new Asylum Program Fee for each Form I-129 and I-140 filed by employers.
Almost one year ago, Washington State passed the “My Health, My Data” Act, which aims to protect Washington consumer health data, particularly data related to reproductive health care.
Asset managers and financial services companies are actively incorporating AI into their business, even as the regulation of artificial intelligence in the United States is still developing.
The maritime industry is undergoing a significant transformation that involves increased use of cyber-connected systems, coinciding with increased nation-state and cybercriminal targeting of cyber systems in ports and maritime assets