• Cybersecurity Law & Strategy

    Five Smart Steps to Prepare for GDPR Data Subject Rights

    Sonia Cheng, Eckhard Herych, and Richard MacDonald

    Many corporations around the globe are preparing for May 2018, when Europe's General Data Protection Regulation (GDPR) enforcement kicks in. The regulation encompasses a wide range of nuanced privacy requirements that can be challenging to operationalize. In particular, requirements around the rights of European data subjects — which include the right to be forgotten and rights to access, rectification and objection to processing — will be some of the most difficult to address.

    Read More ›

  • Cybersecurity Law & Strategy

    NY AG Proposes Stricter Data Security Laws Citing Equifax Breach

    Josefa Velasquez

    Following the Equifax Inc. breach that compromised personal information of 145.5 million Americans including more than 8 million New Yorkers, Attorney General Eric Schneiderman is proposing comprehensive legislation to tighten data security laws

    Read More ›

  • Cybersecurity Law & Strategy

    Uber In-House Attorney Out Behind Massive Cyberattack That Went Undisclosed

    Stephanie Forshee and Jennifer Williams-Alvarez

    The Company Failed to Notify 57 Million Users of a Breach In October 2016. Two Employees Tasked with Handling the Response Process Have Left the Company, Including Uber In-House Attorney Craig Clark, Who Reported to the Company’s Chief Security Officer.

    Uber Technologies Inc. failed to notify 57 million users that their data was exposed in a breach, according to a company blog post published on November 21, which was confirmed by a source close to the matter.

    Read More ›

  • Internet Law & Strategy

    Five Smart Steps to Prepare for GDPR Data Subject Rights

    Sonia Cheng, Eckhard Herych and Richard MacDonald

    Many corporations around the globe are preparing for May 2018, when Europe's General Data Protection Regulation (GDPR) enforcement kicks in. The regulation encompasses a wide range of nuanced privacy requirements that can be challenging to operationalize. In particular, requirements around the rights of European data subjects — which include the right to be forgotten and rights to access, rectification and objection to processing — will be some of the most difficult to address.

    Read More ›

  • Internet Law & Strategy

    What Lies Beneath the Surface: The Dark Web

    Elizabeth Vandesteeg and Jeffrey Goldberg

    Nearly all of us access the World Wide Web on at least a daily basis. Yet for many of us, there is a fundamental lack of knowledge about the basic structure of the Internet and the way its different levels interact. This article provides a basic outline of the structure of the Web and some insight as to the purpose for and content housed on each level, as well as give some practical tips to avoid your company's data from ending up on the Dark Web.

    Read More ›

  • Cybersecurity Law & Strategy

    Podcast: Phishing

    Jason Thomas

    Phishing is one of the more pervasive cyber attacks in the world, and while we've all received phishing emails, phishing attacks have become more sophisticated and come in different forms other than emails from Persian princes.

    Read More ›

  • Cybersecurity Law & Strategy

    Data Security and Data Breach Response Continue to Be a Hot Issue

    Kevin Coy

    Lessons from 2017 Enforcement Actions and Guidance

    Regulators including the FTC, the Department of Health and Human Services Office of Civil Rights (OCR) — the agency responsible for enforcing the HIPAA rules for protected health information (PHI) — and state attorneys general have issued guidance and announced a number of settlements in data security cases that are instructive about measures that organizations can take to reduce the potential for a data breach or, if a breach does occur, provide appropriate notice.

    Read More ›

  • Cybersecurity Law & Strategy

    Security First Approach Provides a Significant Advantage to Law Firms

    Mark Sangster

    The security industry all too often sells the next shiny object touted as the Holy Grail of security that protects against all cyber threats. And the following year, the next best thing hits the market and becomes the grail until proven fallible.

    Read More ›

  • Cybersecurity Law & Strategy

    Equifax Breach Will Fuel Identity Theft Remediation Debate

    Angela R. Matney

    In the wake of suits filed against Equifax by consumers, businesses and governmental units, courts will have to grapple with the question of what remedies are appropriate. These issues are not unique to the Equifax incident, but the scope of the breach will undoubtedly lead to more debate than ever before.

    Read More ›

  • Cybersecurity Law & Strategy

    What Lies Beneath the Surface: The Dark Web

    Elizabeth Vandesteeg and Jeffrey Goldberg

    This article provides a basic outline of the structure of the Web and some insight as to the purpose for and content housed on each level, as well as give some practical tips to avoid your company’s data from ending up on the Dark Web.

    Read More ›

Need Help?