Call 855-808-4530 or email GroupSales@alm.com to receive your discount on a new subscription.
The newly appointed Penn State professor sees a lot of room for questions in the evolving cyber law landscape, but so far there are few answers.
As a law student, Anne Toomey McKenna worked as a research assistant for a professor who happened to be working on a treatise on wiretapping. McKenna thought she was headed for a career as a civil litigator and took the opportunity as kind of a one-off thought exercise, something that was unlikely to shape much of her career.
*May exclude premium content
By Kenya Parrish-Dixon
By the time you read this, Americans will have been working from home for more than three months. This has never happened before in this country during the age of technology. As millions logged on to their home networks and personal devices in an attempt to keep their companies afloat, cybersecurity issues rose to the forefront of the many issues that companies had to manage.
By Mike Hamilton
The biggest challenge with any legal hold process is ensuring that potentially relevant data is actually preserved. But with evolving requirements for how data is managed by new data privacy laws like the CCPA and the GDPR, it’s become harder to secure data by simply sending a legal hold and assuming the custodian will do their duty to preserve it.
By Ryan Drimalla and Karl Dorwart
The London Interbank Offered Rate has long been the global basis for agreements that include a variable interest rate component. However, LIBOR would be replaced by other benchmarks by the end of 2021. Key to assessing risk of exposure, quantifying the financial impact, developing remediation plans and communicating material information to stakeholders will be the identification, analysis and remediation of LIBOR-based contracts.
By Tomas Suros
As the current pandemic has forced much of the world into virtual workforce mode, cybercriminals have seized on the uncertainty of the current times to launch new and creative offensives. Fears surrounding COVID-19 are high, conspiracy theories are running rampant, and cyberattackers are counting on stress and distraction to decrease our vigilance against intrusions.