Features

Cybersecurity Comes Together In Legal and Finance
Data security in the financial and legal industries is a tale of two sectors. While the financial industry is heavily regulated and constantly watched by federal agencies, law has at times operated in an almost laissez-faire environment, more ruled by a culture of confidentiality and secrecy than hard regulatory rules.
Features

Data Breach Lawsuit Highlights the Need for Diligence when Purchasing Cyberinsurance
Well-known restaurant chain, P.F. Chang's China Bistro, recently sustained a significant hit to its cyberinsurance coverage. The federal court's opinion in the case serves as a lesson to policyholders regarding cyberinsurance in a rapidly evolving market. Due diligence is the name of the game when placing such insurance in order to understand the scope of coverage.
Features

Practical Approaches to the EU-US Privacy Shield
This article discusses the corporate impact of the EU-US Privacy Shield and practical approaches to managing global corporate data in the wake of <i>Schrems</i>.
Features

In Light of Recent FTC Actions, Review Your Privacy Policy
The United States does not have comprehensive legislation addressing the privacy implications of the collection and use of geolocation data. However, the Federal Trade Commission (FTC) has used its enforcement authority under Section 5 of the FTC Act to regulate companies engaged in unfair or deceptive practices involving geolocation data.
Features

WhatsApp, Encryption and the Battle with Law Enforcement
It is widely accepted that much of today's communications are digital — and as a result, the encryption of data, the privacy laws governing that data, and the role that governments play when national security and law enforcement issues are at stake is a very hot topic.
Features

What Lawyers Can Learn from Uber, Redux
Lawyers need to know what the client wants and how to get them there before the process starts. Just like a driver who doesn't know exactly where he's taking his riders, a lawyer who isn't totally sure what a client wants — let alone how to get them there efficiently and effectively — is likely to end up with a client who is disgruntled.
Features

The Human Factor In Information Security
No one can deny that cyberattacks are the new norm. Such risks will increasingly challenge our ability to operate our businesses. In the world of cybercrime, everyone — from individuals to nation-states — is a target. However, some targets are more alluring than others.
Features

What Lawyers Can Learn from Uber, Redux
Lawyers need to know what the client wants and how to get them there before the process starts. Just like a driver who doesn't know exactly where he's taking his riders, a lawyer who isn't totally sure what a client wants — let alone how to get them there efficiently and effectively — is likely to end up with a client who is disgruntled.
Features

The Human Factor In Information Security
No one can deny that cyberattacks are the new norm. Such risks will increasingly challenge our ability to operate our businesses. In the world of cybercrime, everyone — from individuals to nation-states — is a target. However, some targets are more alluring than others.
Features

<b><i>Online Extra</b></i><br>Chinese Nationals Charged With Hacking Firms to Steal M&A Info
Three Chinese nationals face federal charges for allegedly hacking into two major U.S. law firms in a scheme to trade on information about imminent mergers and acquisitions.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- Private Equity Valuation: A Significant DecisionInsiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.Read More ›
- Meet the Lawyer Working on Inclusion Rider LanguageAt the Oscars in March, Best Actress winner Frances McDormand made “inclusion rider” go viral. But Kalpana Kotagal, a partner at Cohen Milstein Sellers & Toll had already worked for months to write the language for such provisions. Kotagal was developing legal language for contract provisions that Hollywood's elite could use to require studios and other partners to employ diverse workers on set.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity LitigationWhile the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.Read More ›