Call 855-808-4530 or email GroupSales@alm.com to receive your discount on a new subscription.
Since the passage of UETA and ESIGN in 1999/2000, I have been fascinated as to exactly how the legal terminology of these and other “digital security” statutes equates to actual cryptographic methods. When someone writes a piece of software that “meets and/or exceeds these requirements,” and are “warranted for compliance” under these acts, how do contracting officers, lawyers, judges and everyone involved understand? It isn’t quite like a set of map directions: it’s difficult to draw a straight line from act to software function. As the digital landscape continues to grow and expand in scope, how does the legal profession keep up?
By Michael Smolenski
It’s clear that the onset of GDPR regulations and a quickly changing consumer sentiment about the sensitivity and value of their personal data will reorient a company’s interactions with their customers and their information. There will be some pain points in this transition, as Facebook investors recently demonstrated, but it doesn’t have to be a unilateral downturn for the tech industry.
By Zach Warren
Gemalto’s 2018 Breach Level Index found 4.5 billion records were stolen, lost or compromised worldwide in the first half of 2018, a 133 increase over the first half of 2017.
By Roy E. Hadley, Jr.
During the time it takes you to read this article, somewhere in the United States, a governmental entity will probably be the victim of a cyber-attack. This article highlights the areas that are most impactful, based on experience in dealing with both large and small cyber-attacks against governments and governmental entities.
By André Bywater and Jonathan Armstrong
This article provides a brief education about where things currently stand in the UK as regards to sanctions and anti-money laundering in the shifting sands of the Brexit process.