Showing posts with label jason atchley attorney. Show all posts
Showing posts with label jason atchley attorney. Show all posts

Wednesday, December 30, 2015

Jason Atchley : Tech : These 6 Startups are Changing the Face of AI in 2016

jason atchley

These 6 startups are changing the face of AI in 2016

ai.shutterstock_100185233
Image Credit: Shutterstock
This post is produced by BeMyApp.

According to researchers2016 will be the year of AI. Believed to be replacing the screen age as one of the “hot consumer trends,” the latest in AI allows for much more than robots, personal assistants, and self-driving cars.
Facebook recently announced that the company is open-sourcing its Big Sur servers designed for deep learning (i.e. voice, image, and language recognition). The move comes as no surprise. Google, IBM, and Microsoft already took decisive steps towards opening their AI technologies earlier this year.
And while tech giants in Silicon Valley are fighting over AI dominance, six startups from around the world are getting VC’s attention. As part of theHacker Unit accelerator program — the first remote accelerator for disruptive startups — these companies are on their way to shape the future of AI.

1. Legal Robot

Reading through and understanding legal documents can be a huge hassle for many. With an increasing number of small businesses and individuals trying to navigate the field, Legal Robot helps with understanding complex legal language using AI without the cost associated with it. The company’s goal is to empower consumers, save businesses money, and let lawyers focus on what matters. The startup uses AI to parse legal documents and translates them into accessible language; it also handles analyzing contracts, and according to its founders, “improves transparency.”

2. Semantile

Semantile is a Relevancy Engine Platform that brings AI to semantic text analysis. It allows people and companies to have a better comprehension of what a word is or is related to. It helps businesses and enterprises extract all meaningful and actionable concepts from their unstructured text and sort them accordingly. For example, if you search for a BLT on Semantile, the algorithm will tell you what is a proper BLT, what defines this sandwich, what makes it different from a burger. The Semantile team is composed of startup veterans and their mission is to re-wire how relevancy matching is done today. Semantile’s proprietary and patent pending semantic annotation and similarity discovery technology makes it a high quality and fast text analysis software compared to other text analytics in the market.

3. Shadeo

Similar to Shazam but designed for products, Shadeo is an automated in-video advertising plugin. The goal is to be able to initiate a search of an object from any kind of media flow — video, picture, etc. — and interact with it. It gives users a brand new way to search on the web and buy products that interest them. For businesses, this is an opportunity to generate qualified leads without major changes in the commercial process. So next time you see a suit in a James Bond movie that you want, you will be able to get it with just three clicks.

4. Real Life Analytics

We can’t be talking about Artificial Intelligence and not look into big data, especially when it comes to analyzing consumer behavior. The startup Real Life Analytics enables targeted advertising on any digital screen in real time using plug-and-play AI dongles. Think of commercial displays you see in places like shopping centers and subway stations that can now leverage real-time facial recognition to customize the content according to the viewer’s engagement and demographics: age, gender, etc. and provide insight into customer demographics and behavior. And we thought search-based ads were brilliant.

5. ClevAPI

ClevAPI allows brands to automatically put their logos and products on top of related objects and make advertising more natural and engaging for viewers. The SaaS technology receives and processes images, and then returns a list of tags that describe image content and precise location of recognized objects. Ultimately, ClevAPI provides real-time image recognition service for product placement and native advertising. The company is founded after years of research in deep learning and computer vision.

6. Riminder

Riminder is a service aiming to disrupt the HR industry and job seeking. Using a unique technology and tapping into deep learning, the application has a dual purpose: on one side, it helps individuals improve their career path thanks to the two million careers the company has analyzed. Simultaneously, Riminder allows talent managers and recruiters to leverage both internal and external data to attract relevant talent and pinpoint high potential candidates. Don’t miss the right candidate or the most fitting job again — use real data and make smart decisions.
Being part of the Hacker Unit accelerator is allowing these startups founded in different places around the world to connect and work with mentors and experts. The program is designed to be entirely online and this first batch is graduating in March. Follow their progress as they take AI one step further.
If you’d like to get in touch with them and find out more about their solutions, we will be happy to help: contact@hackerunit.com.

Hacker Unit was launched in November, 2015 by BeMyApp and aims to solve the problem of successful business acceleration and fund-raising tied to geographic location.
Vera Glavova is Director of Operations, BeMyApp.

Monday, December 28, 2015

Jason Atchley : Legal Tech : LXBN’s 2015(+) in Review: Net Neutrality Impacts All Internet Users in the US, But Net Neutrality Laws Still Unclear

jason atchley

LXBN’s 2015(+) in Review: Net Neutrality Impacts All Internet Users in the US, But Net Neutrality Laws Still Unclear

Posted in eCommerce, Net Neutrality
LXBN 2015 Year
The LexBlog Network (LXBN) featured this blog on December 23, 2015: Although Internet access is essential to all businesses and individuals in the US (and around the world), apparently the F.C.C. (Federal Communications Commission) continues to struggle with getting Net Neutrality legally correct.  Most people don’t even realize what’s going on with the Net Neutrality controversy which has been in and out courts over the past of the past decade , but what’s at stake will impact us all.
I liked the simple explanation of what Net Neutrality is from the New York Times on the eve of the December 4, 2015 hearing before the DC Circuit Court of Appeals:
It’s a lousy name for the idea that traffic for all legal content on the Internet should be treated equally. In practice, that principle has taken shape in F.C.C. regulations that bar Internet service providers from blocking certain websites or making them download slower or faster than others.
An example of a net neutrality violation would be if Comcast decided to intentionally make streams of Netflix videos buffer while allowing its own streaming service to play seamlessly to its millions of home broadband customers. Another would be if AT&T blocked Facebook Messenger for its wireless customers.
At that December 4th hearing the plaintiffs challenged the F.C.C.’s authority to regulate and control the Internet by classifying broadband Internet as a Title II service which is the same bucket which the F.C.C. regulates telephone services (Communications Act of 1934).  The F.C.C. actually took this action after the same DC Circuit Court’s 2014 vacated the then current Net Neutrality rules.
Also the New York Times reported that Judge David Tatel, who wrote the opinion when the case was last before the DC Circuit Court of Appeals in 2014:
…pointed several times to case history that supports the F.C.C.’s move to regulate broadband services like utilities. He said an opinion by the Supreme Court in 2005 gave the F.C.C. the ability to categorize communications services as it sees fit.
Explaining the argument the New York Times also made these observations:
Telecom and cable firms argue that broadband services are not the same as telephone services and should not be strapped with the same utility-style framework of heavy regulations. They say the F.C.C. illegally put broadband into the same bucket as phone services so the net neutrality rules should be overturned. The agency has argued that it had to reclassify broadband as a utility-like service after the court vacated rules last time and told the agency it was making rules on shaky legal ground.
Google is Pro and Con!
Here’s a great irony, in 2013 Wired reported that Google is on both sides of Net Neutrality –as an ISP and as a provider of fiber.  A Kansas City potential customer filed a claim with the F.C.C. that Google would not permit that potential customer to run a server on the Google fiber which Google defended.  So as a fiber provider Google wants limits that are the opposite of what they demand as an ISP.
Watch Out for a Political Change
Only to make things more complicated Net Neutrality is also a very political issue since theF.C.C. has five Commissioners, of whom the Chair is appointed by the US President and whatever party the President hold a majority of three of the five Commissioners’ posts.  So if a Republican is elected President in 2016 then the control of the F.C.C. would shift and it is entirely possible Net Neutrality would morph into something different.
Also for all we know Congress may decide that they know better and revise the F.C.C.’s power and take control over Net Neutrality.
To make a long story short, Net Neutrality may not be resolved by the DC Circuit’s upcoming ruling and remain a complicated legal issue for years to come.

Sunday, June 14, 2015

JASON ATCHLEY : DATA STORAGE : MAKING MAGIC HAPPEN WITH DATA-AWARE STORAGE IN THE PUBLIC SECTOR

JASON ATCHLEY : DATA STORAGE : MAKING MAGIC HAPPEN WITH DATA-AWARE STORAGE IN THE PUBLIC SECTOR

jason atchley

MAKING MAGIC HAPPEN WITH DATA-AWARE STORAGE IN THE PUBLIC SECTOR

Courtesy of Flickr user stevendepoloIT pros should be allowed to add “magician” to their resumes. (Outside of the “personal interests” section, we mean. To each his own.)
On a daily basis, we hear how our customers are bringing IT magic to their organizations by streamlining tired processes and proposing innovative new ways to avoid risks and encourage team productivity. All the more impressive is the materials these pros usually have at their disposal. Major enterprises tend to have access to expansive teams and the latest tools to help power their latest projects. Midmarket companies and public sector organizations, however, need to distribute resources wisely and make educated decisions that enhance value, protect the agency’s most confidential data and keep budget top of mind.
Data-aware storage helps IT pros command a magic power – the ability to unlock the value of their data and incite change in their organizations. Now that Promark Technology has added DataGravity to its General Services Administration (GSA) Schedule, public sector organizations can harness this power and experience the benefits it makes possible. Promark has a two-tier distribution agreement that connects value-added resellers and system integrators with government agencies and public sector organizations in need of storage innovation. Federal, state, local and education (SLED) agencies leverage this relationship to help cut their spending by billions of dollars.
Whether you’re a full-fledged data magician or an IT pro with a few tricks up your sleeve, DataGravity can help you conjure up business value. And now, Promark will help public sector organizations pull off the following feats:
  • Meet tight compliance policies, through the ability to see which files violate regulations and which users are accessing them;
  • Track when users read, write, delete and update files and use data visualizations to provide a clear picture of any inherent risks;
  • Shine a light on dark data to avoid racking up storage costs while exposing the organization to long-forgotten security risks; and
  • Identify the files and encourage the collaborations that help teams streamline tasks and increase productivity.
Contact DataGravity to find out how data-aware storage can make magic happen at your company

Tuesday, May 26, 2015

Jason Atchley : Data Breach Liability: Confidentiality vs. Privacy

jason atchley

Data Breach Liability: Confidentiality vs. Privacy

, Corporate Counsel

Read more: http://www.corpcounsel.com/id=1202727103440/Data-Breach-Liability-Confidentiality-vs-Privacy#ixzz3bHYR6x9I


IT service providers, particularly cloud service providers, increasingly are resisting unlimited liability for breaches of privacy and data security obligations in their customer agreements. Instead, they offer unlimited liability for breaches of confidentiality, asserting the customer’s risk of a data breach would be covered as a breach of confidentiality, and arguing that unlimited liability for breaches of data protection obligations is simply double dipping.

A Data Breach Is Not Needed to Create Liability

When an IT service provider takes this position, one of the first questions a customer asks is: Assuming that the service provider has access to data that would be covered by privacy and data security laws, what is the risk if the provider breaches the privacy and data security obligations without an actual data breach
In other words, does there need to be a data breach for the customer to incur liability? Unfortunately, the answer is no.
To fully understand the risk of accepting the IT service provider’s position, a customer should identify:
  • The privacy and data protection requirements the customer must satisfy.
  • The likelihood the IT service provider may cause the customer to fail to comply with those requirements.
  • The potential for damages, fines, penalties or other enforcement activity if the customer fails to comply with those requirements—even absent a data breach.

Privacy and Data Protection Requirements

In terms of the privacy and data protection requirements the customer may need to satisfy, the customer should consider legal and regulatory requirements (including regulatory guidance) and industry standards. For example, if a customer collects or processes credit card information, the customer must comply with the Payment Card Industry Data Security Standards (PCI DSS) as well as Visa's Cardholder Information Security Program (CISP), MasterCard's Secure Data Protection program (SDP) and Discover Network's Information Security and Compliance program (DISC). In addition, Massachusetts 201 CMR 17.00 requires a company that owns or licenses personal information of Massachusetts residents to implement and maintain a comprehensive information security program that contains administrative, technical and physical safeguards.
Even if there is no data breach, failing to comply with these standards may subject the customer to enforcement actions by the relevant regulatory authority and/or significant fines.

‘Flow-Through’ Terms

Once a customer identifies the relevant requirements, the customer should ensure that these requirements are expressly passed through to the IT service provider through well-tailored “flow-through” terms. Not only is the customer at risk for liability if the IT service provider causes it to fail to comply with the requirements; simply failing to flow through the requirements may subject the customer to liability for noncompliance.
This is true even if the service agreement includes a confidentiality clause, which generally requires the receiving party to exercise a duty of care to protect confidential information of the disclosing party in a way that is consistent with the measures the receiving party takes to protect its own confidential information. It is often unclear, however, exactly what measures an IT service provider takes. For example, Massachusetts 201 CMR 17.00 specifically requires companies to oversee its service providers, including requiring its service providers by contract to implement and maintain appropriate security measures.
Legal requirements and industry standards are not the only potential risk. The customer also may have contracts in place with its end-user customers and other third parties that would expose it to unlimited liability for breaches of privacy and data security obligations. If the IT service provider only offers unlimited liability for breaches of confidentiality and the IT service provider’s obligation is to comply with its own duty of care standard and not the customer’s standards, the customer may not be able to look to the IT service provider for full recourse if the IT service provider causes the customer to breach these contractual obligations.

A Data Breach Does Not Always Mean a Breach of Confidentiality

Even if there is a data breach, customers may be at risk that the confidentiality provision does not cover the data subject to the breach. Confidentiality provisions often define “confidential information” in a manner that may not encompass all of the data subject to privacy and data security laws. For example, the definition may include only information that is labeled as confidential or that a “reasonable person” would consider to be confidential. In this case, certain types of data, such as IP addresses or geolocation data, are unlikely to be labeled as confidential when disclosed to the IT service provider and may not be something a “reasonable person” would consider to be confidential.
“Confidential information” often is defined to include end-user customer data but not employee data. The IT service provider’s services, however, may include storing or processing employee data. Particularly for services such as cloud-based HR solutions, this may be as simple as receiving employee names, phone numbers, addresses and emails in order to provide technical support.
If the customer discloses personally identifiable information to the IT service provider that is not covered by the definition of confidential information, then a breach of that data would not be a breach of confidentiality for which the IT service provider would have unlimited liability under the service agreement.

Conclusion

The risk of liability for a breach of privacy and data security obligations without a data breach is only increasing. Audit and enforcement activities have continued to increase, an example being the U.S. Department of Health and Human Services Office for Civil Rights’ focus on HIPAA privacy rule violations—with some resulting in civil penalties in the millions. This risk is likely to continue to grow as regulators and states become even more active in setting data protection requirements and enforcing them, including increasing scrutiny of how companies are flowing down protections to third parties.
Customers will want to minimize their risk in deals with IT service providers by (1) including privacy and data security obligations sufficient to satisfy their privacy and data protection requirements; and (2) insisting on uncapped liability for the IT service provider’s breach of those obligations. If the IT service provider simply refuses to accept such unlimited liability and only offers uncapped liability for breaches of confidentiality, the customer may try to reduce its risk by:
  • Including privacy and data security obligations sufficient to satisfy the customer’s privacy and data protection requirements, even if those obligations are subject to a general limitation on liability.
  • Ensuring damages the customer may incur for breach of privacy and data protection obligations, such as regulatory fines, penalties and the like, are not excluded by a sweeping exclusion of liability for consequential damages, even if they are subject to a general limitation on liability.
  • Seeking a heightened liability cap for breaches of privacy and data security obligations in addition to uncapped liability for breaches of confidentiality
  • Defining “confidential information” to ensure it encompasses all personal data the customer may disclose to the IT service provider.
  • Including the right to terminate for convenience without the payment of any early termination charge.
Glynna Christian is a partner in the corporate department of Kaye Scholer’s New York office. She has over 20 years of experience advising Fortune 100, FTSE 100, and a variety of other public and private companies on complex transactions, including mergers and acquisitions, joint ventures, and other forms of strategic investments and partnerships. She also advises on outsourcing and commercial transactions with an emphasis on technology, media and financial services. Nikki Mondschein is an associate in the corporate department of the firm’s New York office and a member of the IP and technology transactions group. She provides strategic advice to clients on corporate and commercial transactions with an emphasis on the technology, software, media, arts and entertainment sectors. She previously worked as corporate counsel at Apple and Nokia.


Read more: http://www.corpcounsel.com/id=1202727103440/Data-Breach-Liability-Confidentiality-vs-Privacy#ixzz3bHYf5Md1



Tuesday, May 19, 2015

Jason Atchley : Data Security : Four Ways IT Teams and CIOs Can Improve the Security Status Quo

jason atchley

4 Ways IT Teams and CIOs Can Improve the Security Status Quo

By Perry Dickau
Few conversations are more stressful for IT pros and CIOs than the ones immediately following a data breach. The unauthorized exposure of customer or employee personally identifiable information (PII) or intellectual property/trade secrets is a worst-case scenario for most companies, so it’s only natural that proactive data protection is a priority. As the recent RSA Conference made clear, it’s no longer enough to enlist reactionary security strategies or focus solely on preventing hacks at the perimeter. Instead, your company must minimize threats by protecting data where it lives.
The only way to avoid that awkward post-breach conversation is to stop it from happening in the first place. Here are four important ways to start improving your data security landscape before a breach occurs.
Protect data at its core.
Data lives and moves within a layered ecosystem – from where it is stored, through networks, servers, applications, and firewalls – as it is managed and consumed throughout its lifecycle.  Does your team prioritize the application or firewall layers at the top of the IT stack when you’re developing security protocols? This strategy has been proven largely ineffective, so it’s time to make changes to the security status quo.
Securing the perimeter is an integral part of data protection, but this method alone is one-dimensional and outdated, and it can leave your business powerless against new threats. Eliminating the possible effects of a breach at the center of the IT stack is more effective, and it’s a more prudent use of time and money. Securing PII and other sensitive data where it’s created means that even if an outsider gains entry to your network, he won’t readily be able to steal information.
Don’t follow hackers’ leads.
It’s important to update security protocols as new threats emerge, but this can’t be the only weapon in your arsenal. Status quo security methods can only stop known threats, and playing catch-up to the evolving security landscape is a losing proposition for IT teams and CIOs. Instead, stay ahead of cybercriminals by creating a holistic approach that uses actionable insights to protect infrastructure on both the inside and outside.
Consider the security of your ecosystem, not just your IT.
The Ponemon Institute reports that 78 percent of data breaches are caused by employees saving information in a vulnerable domain or deleting critical files, while hackers are increasingly adroit at getting into corporate IT systems through other paths. For example, back-door approaches like exploiting unused accounts practically invite hackers to gain entry undetected.
Data-aware technology secures data as it’s created, increasing protection and eliminating threats. If your efforts are devoted to keeping threats out, your core ecosystem won’t be prepared to withstand a breach when one manages to get in. The companies that have suffered high-profile hacks in recent months are a major reminder that change is needed in the security industry, and it’s time to do something different in order to get – and stay – ahead of inbound threats.
Accept that you can’t stop a breach in its tracks.
This isn’t an easy thing for a company to accept. CIOs want to know their teams can identify issues as they occur and bring them to a halt instantly. Unfortunately, this isn’t a reality for anyone. Even detecting a breach or hack while it’s happening has proven difficult. Frequently, the only way to discover these issues is through monitoring event logs or after the subsequent fallout. Adopting a security protocol that improves data visualization can help you prevent data breaches before they take hold, which becomes far more valuable than trying to stop them as they occur.