Call 855-808-4530 or email GroupSales@alm.com to receive your discount on a new subscription.
The allegations that Russia hacked the Democratic National Committee (DNC) is the latest evidence that cybersecurity has and will continue to have an overarching impact on our daily lives. Further complicating the cyber threat is that it is evolving so quickly that it outstrips the ability of our private or government sectors to adequately address the threat and its consequences. The severity of the cyber threat has resulted in the private sector and the United States government partnering to identify and respond to threats that can impact entire industries, especially financial services and the electrical grid, two essential parts of our country’s critical infrastructure. This article examines: 1) the challenges that inhibit partnering between the private and public sectors; 2) how such partnership is addressed in the Cybersecurity Information Sharing Act (CISA) of 2015; and 3) what this all means going forward.
By Gabrielle Orum Hernández
Gov. Nathan Deal opted to veto a cybersecurity bill criticized by technology groups that would have made “unauthorized computer access” a crime.
By Stacey Garrett
U.S. laws require companies to retain records for years, and sometimes forever, and violating U.S. records retention laws can result in domestic fines and penalties. How can U.S. companies comply with the GDPR’s “right to erasure” while still fulfilling their U.S. records retention obligations?
By Ishan Girdhar
Most firms have extensive cybersecurity measures in place, but emerging or unclear regulatory requirements embroil them in a never-ending cycle of evaluation, best-practices review, and implementation. Firms don’t just need to have their own systems secured; a responsible firm must also reduce the risk of breach at their third-party vendors. As cloud service providers become commonplace, so too does a firm’s responsibility to ensure their vendors are managing risk appropriately.
By Mark Sangster
Small Law Firms Face Large Regulatory Requirements
Unlike large firms with comparable resources with which to protect client non-public information, small firms can find themselves trapped between cyberattacks, like ransomware, that don’t prejudice based on the size of firm, and regulators who are indifferent to your size, when investigating a potential violation.