This GT Advisory considers the application of state unclaimed property laws to cryptocurrencies, and the potential implications and challenges of such application for both industry participants and state unclaimed property
Continue Reading Cryptocurrencies and Unclaimed Property: Potential Implications of State Escheat Laws for the Blockchain Technology Industry

2018 was a year of transformation for the blockchain industry. While the market continued to see technological advancements in smart contracts, platform functionality, scalability and security, regulators took a firmer
Continue Reading Blockchain & Cryptocurrency Newsletter – Winter 2019

In our Feb. 9th blog post, we highlighted some of the amazing technology being used at the 2018 Winter Olympics in Pyeongchang, South Korea. While awe-inspiring, the use of these technologies can give rise to legal challenges that may need consideration.

AI, Robots and Drones – Oh My!

Artificial intelligence (AI) abounds at this year’s Winter Olympics, particularly in the form of robots and drones. South Korea has one of the highest concentrations of industrial robots in the world, so it’s no surprise that this Olympic host country is using 85 very different AI-enabled robots to do everything from greeting travelers and providing multilingual information on schedules, transport, and attractions, to carrying the Olympic torch. As part of the entertainment at the games, robots even competed in their own Olympic ski challenge this week. Drones are also taking center stage with elaborate light shows and filming techniques.


Continue Reading Technology’s Legal Road to the 2018 Winter Olympics – and Beyond

Greenberg Traurig sponsors the leading internet conference NOAH 2016. In June, over 3,000 attendees including entrepreneurs, investors, corporate executives, networkers and journalists met in Berlin to discuss disruptive trends across


Continue Reading Greenberg Traurig partners with leading internet conference NOAH in Berlin and London

Migration is already underway, but some of the world’s largest organizations are still reluctant. They handle proprietary data and a staggering volume of transactions.  They want to marshal information and deliver nuanced results.  But a lack of appreciation for the Cloud’s promise, together with questions surrounding security and cost, make many CTOs and COOs cling to legacy systems.

shutterstock_110126165_778x360

At the surface, the Cloud is seemingly straightforward even for occasional users; using encryption and/or password protection, individuals log on to a website, smartphone app, or similar “thin” interface. They may send an email, manage ‘Internet-of-things’ controls, reserve a seat, store a document, access a data base, or subscribe to an online tool for accounting or lead tracking.  While it’s clear that the “back office” intelligence sits someplace else, users probably don’t appreciate the architecture.

Understanding the Cloud’s capabilities and shortcomings is key to a thoughtful migration strategy. Can organizations really save money by replacing their on-premise solutions?  How do they comply with regulations around the world addressing the collection, use and transfer of personal data?  When migrating, do they retain control of their systems?  What about cyber security?  Here’s a simplified description for non-technologists!


Continue Reading Cloud Migration Demystified

After seeking to pass broad private sector cybersecurity legislation for a number of years, Congress finally passed and the President signed into law the Cybersecurity Act of 2015 (Cybersecurity Act).

The Cybersecurity Act makes three key changes in current law. First, it provides explicit authorization for companies to share cyber threat information with each other and the government, as well as receive such information. Second, it authorizes private sector use of defensive measures, and third it provides a safe harbor from liability for sharing the cyber threat or defensive measure information in good faith in compliance with the safeguards required by the legislation.


Continue Reading Congress Finally Passes the Cybersecurity Act of 2015