Account

Sign in to access your account and subscription

Cybersecurity

  • Part Two of a Two-Part Article

    In Part One of this article last month, we began a discussion designed to demystify the hesitations behind cloud security and analyzed the fast-growing transformation to a range of newer technical approaches with important consequences for legal practice. This month we continue the discussion by tackling the security and legal implications of the mass transformation of enterprise IT to cloud services from leading providers such as AWS and Azure.

    July 01, 2018Adam Cohen
  • The same applications, and the same cryptographic protocols, don't function in the exact same ways when appearing in 'the same software' utilized in different control devices. What, if any, are the legal ramifications of differing delivery mechanisms for the same cryptographic functions that may or may not perform the same?

    July 01, 2018Paul McGough
  • Building an Intelligence-Led Program

    With reports of major breaches surfacing with alarming frequency, boards and C-Level management are now looking to counsel to implement programs that help the corporation prepare for, quickly recover and reduce fallout from, inevitable cyber incidents. In-house counsel is facing growing responsibility to minimize damage to the corporate reputation, loss of key data, and legal and regulatory penalties. And many worry their organization is stuck in a game of catch-up.

    July 01, 2018Deana Uhl
  • If the U.S. cannot come to an understanding with the European Parliament by September 1, companies that already participate in Privacy Shield may find themselves in limbo. But there are options.

    July 01, 2018Eric Levy
  • In the face of new threats, law firm cybersecurity assessments have become more engaging and demanding affairs. But many hope this new change is just the beginning of a more fundamental shift.

    July 01, 2018Rhys Dipshan
  • Your firm has identified an exciting new technology and done its due diligence. And then, you find yourself in the worst possible scenario: It turns out that the provider's technical support stinks. Here are some potential red flags that will help you evaluate a provider's technical support before you sign on the dotted line.

    July 01, 2018Joe Kelly
  • The confusing and conflicting world of contractual requirements and personal data security breach notification laws can add insult and expense to injury, and sometimes adds injury itself. Tough -- and sometimes expensive -- choices need to be made quickly.

    June 01, 2018Bart A. Lazar
  • Critical to any counsel working to prevent a cyber-attack or respond to a successful cyber intrusion is an understanding why and how to properly utilize both attorney-client and work-product privilege. The overriding principle of using privilege is straightforward: to protect your organization's investigation and breach response efforts from usage by third parties or regulatory agencies in litigation arising from a breach.

    June 01, 2018Robert W. Anderson and Eric B. Levine
  • Part One of a Two-Part Article

    Part One of this two-part article is aimed at demystifying the hesitations behind cloud security and analyzing the fast-growing transformation to a range of newer technical approaches with important consequences for legal practice.

    June 01, 2018Adam Cohen