article thumbnail

FINRA’s 2025 Regulatory Oversight Report on Artificial Intelligence

Debevoise Data Blog

As weve previously discussed , firms should consider implementing a Gen AI governance program that (1) identifies low-risk AI uses cases that do not need a robust compliance review and do not need to be recorded in any AI inventory ( g., Consider also organizing these risks into standard risks ( e.,

article thumbnail

Colorado Proposes Extending AI Regulation to Health and Auto Insurers

Debevoise Data Blog

Definitions of ECDIS, Auto Insurer, and Health Benefit Plan The Draft Amendment employs the same definition of ECDIS for Auto Insurers and Health Benefit Plan Insurers as for Life Insurers with one exception. The cover art used in this blog post was generated by DALL-E.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Voting Is Open! Pick the 15 Finalists to Compete At Startup Alley at ABA TECHSHOW 2024 in February

Above the Law - Technology

Finally, we will directly target clients (enterprises and government agencies) with the idea that our track record would help become their preferred partners. DCS: records ‘instructions’ from grantor and can help send court orders to custodians to try and close out an estate. Trust + Will: Sets a digital asset beneficiary.

Litigator 325
article thumbnail

Webcast: New York DFS Revises Proposed Amendments to Cybersecurity Rule

Debevoise Data Blog

To access an on-demand recording of this webcast, please click here. To access an on-demand recording of this webcast, please click here. If you missed the last briefing, please click here to access the on-demand recording. The cover art used in this blog post was generated by DALL-E.

article thumbnail

Ryanair v. Booking CFAA Trial Ends with Strangest Possible Outcome (Guest Blog Post)

Eric Goldman

To my knowledge, it is still not public record. 1030(e)(11). The statutory definitions of “damage” and “loss” thus focus on technological harms—such as the corruption of files—of the type unauthorized users cause to computer systems and data. Here, there was no loss that meets that definition.

Judge 98
article thumbnail

Webcast: New York DFS Revises Proposed Amendments to Cybersecurity Rule

Debevoise Data Blog

To register to receive an on-demand recording, please click here. If you missed the last briefing, please click here to access the on-demand recording. The cover art used in this blog post was generated by DALL-E. To attend the live webcast, please click here. Do you have specific questions you would like addressed?

article thumbnail

Fostering FinTech Innovation Through the Creation Of Regulatory Cyber Resilience

Global LegalTech Hub

in the DLT & Crypto-Assets Framework Simona Ramos EU Horizon 2020 MSCA BAnDIT Project: (advanced Blockchain Attacks and Defense Techniques): Grant Agreement 814284* A blockchain is a peer to peer distributed ledger that records transactions between two or more parties in a verifiable and permanent way by storing them into a sequence of blocks.

e-records 130