1. Home
  2. |Insights
  3. |U.S. Regulatory and Legal Risks Raised by the Sale of IoT Products

U.S. Regulatory and Legal Risks Raised by the Sale of IoT Products

Webinar | 12.16.21, 8:00 AM EST - 9:00 AM EST

The regulation of connected devices is an ongoing process at the federal and state level, and manufacturers have to contend with a variety of stringent regulations. For example, California’s IoT cybersecurity law went into effect at the beginning of 2020 and requires the manufacturer of a connected device include “a reasonable security feature or features that are…[d]esigned to protect the device and any information contained therein from unauthorized access, destruction, use, modification, or disclosure.” A number of other states, including Illinois, Maryland, Massachusetts, New York, and Oregon, have passed, or are considering similar laws. The federal government is also very interested in this area, and multiple U.S. federal agencies have authority over different aspects of IoT devices.


This webinar will discuss some of the key regulatory and legal risks that companies must contend with if they plan to sell IoT products in the United States, including: 


•        Federal regulatory requirements from agencies such as the FTC and CPSC; 
•        Federal procurement requirements, including the IoT Cybersecurity Improvement Act; 
•        The liability profile when IoT software meets hardware that can present safety risks
•        Managing the data amassed by these products; and 
•        Best practices to consider when designing and selling such products, including building an IoT compliance program.


By registering for this webinar, you submit your information to the webinar organizers and speakers from Crowell & Moring LLP, who will use it to communicate with you regarding this event and their other services.

For more information, please visit these areas: Privacy and Cybersecurity

Insights

Webinar | 06.11.24

Consilio Symposium 2024

Ian Schuler will be speaking on the panel, "An Evolving Playbook: Privilege Protection and Logging.” The discussion will explore strategies for identifying privileged materials, including analytic tools and TAR, and approaches to logging privileged materials, including categorical logs and other types.