blog

State Biometric Laws are Trending and Class Actions Could be on the Rise

By now, most people have undoubtedly heard of biometric-based technology and probably use it every day. Some examples are facial recognition for used for cell security, and voice recognition, like activating a home smart device. Behavioral characteristics can also be considered biometric data – like a person’s handwriting or keystrokes.

read more right

Sedona Commentary Provides Ephemeral Messaging Usage Guidelines

In January, the Sedona Conference published commentary on ephemeral messaging and is open to public input until March 28, 2021. Ephemeral messaging is a dynamic technology that allows people to send secure, end-to-end encrypted messages that auto-delete after a brief period.

read more right

How Far Does the New Federal IoT Law Reach?

Last December, the IoT Cybersecurity Improvement Act became law in the U.S. The legislation outlines security requirements that federal Internet of Things (IoT) devices need to contain going forward. Broadly, IoT refers to any devices that are connected to a network which can share and analyze data. Some IoT examples are smart phones, activity trackers, smart medical devices, and building security systems.

read more right

What is a BitSight Rating and Why Should You Consider Using it to Manage Cyber Risk in Your Supply Chain

If you operate as a B2B organization (business to business), you are either part of the supply chain, manage a supply chain, or you fit into both categories - the latter being the most prevalent. Tools like BitSight provide insights and actionable data to make informed decisions on risks, regardless of where your business sits in the supply chain.

read more right
load more

© 2021 Epiq. All rights reserved.

By continuing to browse and accepting this banner, you consent to the storing of first and third-party cookies on your device to enhance site navigation, analyze site usage, and assist in Epiq’s marketing efforts. Read more on our cookie notice.