Account

Sign in to access your account and subscription

Cybersecurity

  • Recently, the Pennsylvania Supreme Court held that audio interceptions did not violate the rights of the defendant under the Wiretap Act, and so were admissible. The Supreme Court drew a proper and logical conclusion from the facts and the law and, hopefully, brought us closer to a reasonable look at the issue, but we still have a long way to go.

    June 01, 2021Leonard Deutchman
  • For a jurisdiction with little to no discovery process, the EU and its stringent privacy requirements may have already emerged as the next frontier for e-discovery providers looking to expand their business outside of the United States. However, the region's relative inexperience with e-discovery could still emerge as a hindrance for vendors eyeing an EU-based expansion.

    June 01, 2021Frank Ready
  • This article is not about "who did what wrong" or "what nation-state commenced this attack." It's really more about is, "if I am a Director, what should I be thinking about the SolarWinds attack?"

    May 01, 2021Paul A. Ferrillo
  • The most important part of a contract is the data that it generates. If you take all that data from each contract, then aggregate, organize and analyze it, you will have critical insights into the overall effectiveness of your contracting process and the way you transact business.

    May 01, 2021Andrew Banquer
  • It's not a matter of whether you have an interest in crypto, think it's all a bizarre techno-bubble, the eventual replacement for fiat currency, or somewhere in between. The fact of the matter is your clients, and future clients, are more likely than ever to have a connection to this market, and a brief review of the headlines can make this prospect seem terrifying.

    May 01, 2021Ross Benson and Robert N. Driscoll
  • NFTs have been all the rage lately. So what exactly are they?

    May 01, 2021Christine K. Au-Yeung
  • This article looks at privacy discussions, focusing on what in the circumstances discussed renders the IT data private and whether the criteria relied upon when courts and others in the discussion determine that the data is or is not private is truly determinative, as well as properly understood.

    May 01, 2021Leonard Deutchman 
  • For many tech companies today, their products and business model require the collection and storage of data. At the same time, a failure to build adequate data protection technology, processes, and operations will continuously generate "privacy debt" for the business. The accumulation of this "privacy debt" can eventually turn away customers, attract regulatory penalties, and create an existential risk for the company.

    May 01, 2021Catherine Zhu