
Manufacturing Technologies
New privacy regulations along with new sets of guidelines in relation to the principle of “privacy by design” require thorough implementation in a company’s terms and conditions, reporting, and elsewhere. A secure communication management framework, such as the e-ID concept, is needed to comply with EU regulatory requirements, for example.
As automation propels big data, we help our clients develop effective solutions for protecting and managing information assets and complying with data protection law, including the preparation of expert opinions regarding data protection issues, drafting data protection guidelines, assisting with the appointment of data protection supervisors, and settling data protection issues in connection with compliance investigations.
Cyber threats are a growing concern for manufacturers of all sizes. Most manufacturers are critical infrastructure organizations with automated processes, intellectual property, and other sensitive information that may be vulnerable to cyber attacks. We help manufacturers prevent and deter attacks, pursue perpetrators, and mitigate risk and loss. Our team includes members with extensive experience in public policy, cyberforensic investigations, Internet tracking, rapid response, and insurance coverage.
Thought Leadership
Starting on 1 January 2024, entities will need to comply with the reporting rules under the Corporate Transparency Act (CTA).
Effective 27 June 2023, the Pregnant Workers Fairness Act (PWFA) is a new law that closes a gap in coverage under federal law for pregnant and postpartum workers and applicants.
Although still in their infancy, a growing number of recently-filed lawsuits associated with generative artificial intelligence (AI) training practices, products, and services have provided a meaningful first look into how US courts may address the privacy, consumer safety, and intellectual property protection concerns that have been raised by this new, and inherently evolving, technology.
Ransomware attacks and cyber data theft are an unfortunate fact of life for businesses. Whether through attacks targeting individual companies or widespread campaigns carried out by exploiting vulnerabilities in third-party software, such as the 2021 SolarWinds attack and the recent MOVEit hack, cyber criminals are engaging in more frequent and more sophisticated cyber extortion schemes.