Facial Recognition Update July 2020

July 17th, 2020|Categories: Class Actions, Emerging Litigation & Risk, News, Technology Law|Tags: , , , , |

Facial Recognition Technology -- Emerging After Decades of Development -- Draws Lawsuits and Proposed Bans  We sometimes forget that not all of the technical wizards who transformed our world were young “geniuses” jacked up on Starbucks, their shirttails hanging out in the ping-pong section of their open concept offices. Woody Bledsoe was born 99 years ago. As a young son of a sharecropper he demonstrated exceptional mathematical capabilities. Early in his career he had a dream: A machine that could think like a human, converse like one, and even recognize faces. This was as far back as the 1950s. This mathematician and computer scientist would go on to teach for decades at the University of Austin where he worked to advance automated reasoning and artificial intelligence. But what was his role in the development of the technology exactly? Did he perform work for a CIA front? And why, in his old age and suffering from the cruelty of ALS that would ultimately kill him in 1995, did he ask his son to set fire to a stack of old papers? Take a look at “The Secret History of Facial Recognition” written by Shaun Raviv for Wired Magazine, which explores why, among other things, “the record of [Blesdoe’s] role all but vanished.” If there isn’t a movie script in the works there probably will be soon.   Today facial recognition is used in such innocent and handy ways as pointing out [...]

Setting the record straight on cyber insurance claim denials and the ‘war exclusion’

July 22nd, 2019|Categories: HB Risk Notes, Insurance, Technology Law|Tags: , , , , |

Is insurance coverage for cyber claims barred by a war exclusion?  Judy Selby and Peter McLaughlin asked this question in a recent post for IAPP. Two corporate giants, Mondelez International and Merck, made the headlines recently as they sustained serious damage as a result of a NotPetya infection, an encrypting ransomware. They have each filed declaratory judgments after their carriers denied their claims. Reports of these insurance disputes have led to concerns that cyber incidents involving state actors would not be covered by cyber policies with war exclusions. The Verizon 2019 Data Breach Investigations Report attributes 23% of breaches  to nation-states or state-affiliated players. "These state-sponsored attacks typically range from theft or espionage to financial gain; however, some attacks appear to have been driven by grudge or by swatting a neighbor," Selby and McLaughlin write. "[P]erhaps we are viewing this through an old lens. Insurance has often been purchased to address hazards. Specifically, an organization obtains a policy to counter the slim risk of a fire, flood or other catastrophe. Fred Kaplan wrote an article for Slate in April in which he argues the inevitability of attacks – state-sponsored or otherwise – means that we should view cyber insurance more like we do health insurance: coverage against the inevitable, rather than against a hazard risk." Read on for what else Selby [...]

Kenneth Jones of Tanenbaum Keale on Law Firm Tech Development Capabilities

October 16th, 2018|Categories: Corporate Compliance, HB Risk Notes, HB Tort Notes, Technology Law|Tags: , , , , |

Should Law Firms Should be Able to Develop Custom Technologies? Here is #10 of Jones' Top-10 List. #10. Security. The cloud is great, and generally speaking, companies in this space operate systems in a highly professional manner. However, occasionally one encounters special business needs which call for extensive “above and beyond” levels of security. This could be times a firm is storing financial information, medical records, or other data they wish to absolutely, positively protect. In these situations — under the theory that “no one does things better than I do” —it’s nice to have the option to build super-secure systems with features such as encrypted data within database tables, and to manage the systems with a very small number of highly trusted professionals specifically known by the law firm. Read more of the article posted by Thomson Reuters. Kenneth Jones oversees various aspects of technology at Tanenbaum Keale LLP in the role of Chief Technologist. He leads efforts to support TK’s computing environment and infrastructure, one that features a strategy of professionally protecting and processing client data in the cloud with highly skilled and respected leading-edge business partners in the technology space. Ken also helps lead and support various TK programs in the areas of security, compliance, business continuity and firm administration. Learn more. 

Go to Top