Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Presidential Cybersecurity Handoff Image

Presidential Cybersecurity Handoff

Justin Hectus

Given the pending change in administration and uncertainty around President-elect Trump's priorities on cybersecurity, an analysis of the current federal cyber landscape may yield insights into how the next administration might prioritize their approach on this important front.

Features

Internet Law in a Trump Presidency Image

Internet Law in a Trump Presidency

Samar Ali

President Trump is already being pressured to reverse President Obama's Open Internet Order (also known as “net neutrality”) and take an aggressive stance against it. It remains to be seen how President Trump will balance the call for privacy regulations amidst our country's vulnerability to cyber-attacks.

Features

Is Your Data Breach Response Plan Good Enough? Stress Test It Image

Is Your Data Breach Response Plan Good Enough? Stress Test It

Eric Hodge & Rich Blumberg

As the chances of a data breach incident increase, savvy businesses have invested time and thought in a response plan. But plans never survive first contact with the enemy. Stress test your incident response plan to find and resolve its weaknesses while time is on your side.

Features

Most Firms Feel Assured in Cybersecurity Abilities, But Is That False Confidence? Image

Most Firms Feel Assured in Cybersecurity Abilities, But Is That False Confidence?

Ricci Dipshan

Law firms are increasingly confident in their cybersecurity capabilities, despite many falling short of adequate breach response preparation.

Features

Best Practices in Data Security for Financial Institutions Image

Best Practices in Data Security for Financial Institutions

Craig Nazzaro

The Federal Financial Institutions Examination Council (FFIEC) recently revised its Information Security Booklet. The changes bring the financial services industry closer to the goal of having a clearly defined set of cybersecurity and data protection protocols to ensure regulatory compliance.

Features

Cybersecurity Comes Together In Legal and Finance Image

Cybersecurity Comes Together In Legal and Finance

Ricci Dipshan

Data security in the financial and legal industries is a tale of two sectors. While the financial industry is heavily regulated and constantly watched by federal agencies, law has at times operated in an almost laissez-faire environment, more ruled by a culture of confidentiality and secrecy than hard regulatory rules.

Features

Data Breach Lawsuit Highlights the Need for Diligence when Purchasing Cyberinsurance Image

Data Breach Lawsuit Highlights the Need for Diligence when Purchasing Cyberinsurance

Collin J. Hite

Well-known restaurant chain, P.F. Chang's China Bistro, recently sustained a significant hit to its cyberinsurance coverage. The federal court's opinion in the case serves as a lesson to policyholders regarding cyberinsurance in a rapidly evolving market. Due diligence is the name of the game when placing such insurance in order to understand the scope of coverage.

Features

Practical Approaches to the EU-US Privacy Shield Image

Practical Approaches to the EU-US Privacy Shield

Dan Panitz & H. Bruce Gordon

This article discusses the corporate impact of the EU-US Privacy Shield and practical approaches to managing global corporate data in the wake of <i>Schrems</i>.

Features

In Light of Recent FTC Actions, Review Your Privacy Policy Image

In Light of Recent FTC Actions, Review Your Privacy Policy

Devika Kornbacher, Scott Breedlove, Janice Ta & Aislinn Affinito

The United States does not have comprehensive legislation addressing the privacy implications of the collection and use of geolocation data. However, the Federal Trade Commission (FTC) has used its enforcement authority under Section 5 of the FTC Act to regulate companies engaged in unfair or deceptive practices involving geolocation data.

Features

WhatsApp, Encryption and the Battle with Law Enforcement Image

WhatsApp, Encryption and the Battle with Law Enforcement

Domingo Montanaro

It is widely accepted that much of today's communications are digital — and as a result, the encryption of data, the privacy laws governing that data, and the role that governments play when national security and law enforcement issues are at stake is a very hot topic.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES