The Impact of California Privacy and Cybersecurity Law on IoT in the Home
Event submitted on Wednesday, July 21st 2021, approved by Content Team ✓
This event has been tagged as follows:
[edit this info]
California has a bunch of Cybersecurity laws that have become a national focus in the United States. For example, the California Consumer Privacy Act will take effect on January 1, 2020, providing residents with a new set of tools to secure their data and personal information online, as well as imposing new obligations on businesses. Furthermore, California became the first state in the United States to approve an Internet of Things (IoT) cybersecurity bill on September 28, 2018. Governor Jerry Brown of California signed Bill SB-327 into law, which addresses data privacy, particularly as it relates to connected devices. This event will address aspects of these laws with reputable firm Hogan Lovells.
Conference Event Summary
The following description was either submitted by the Conference Organizer on Wednesday, July 21st 2021, or created by us.
Organizers from Hogan Lovells are inviting everyone to the next webinar in our Internet of Things series, focusing on the impact of the following California (and other) laws on IoT offerings:
-California Consumer Privacy Act (CCPA)
-The new California Privacy Rights and Enforcement Act (CPRA)
-The California IoT security bill
California and other privacy laws have a significant impact on consumer applications and devices for home-based use. Through representative use cases in the following areas, attorneys in our top-rated Hogan Lovells Privacy and Cybersecurity practice will discuss strategies for building and maintaining privacy-compliant IoT devices:
-In-home consumer devices ranging from temperature control to alarm systems, and virtual assistants;
-Personal medical devices and health tools provided by life sciences companies for in-home use;
-Other consumer apps; and
Speakers will also discuss the implications of collection, use, and sharing of data from those devices, along with how such data should be protected.