This article familiarizes lawyers with cryptocurrency and, particularly, the enabling blockchain technology, methodologies and systems.
- April 01, 2017Emile Loza de Siles
The Updates are the First Released Since 2007
March 30, 2017Zack WarrenAn ALM Survey Reports Disturbing Information
March 02, 2017Ricci DipshanIf your company maintains operations in the European Union or is U.S. based but obtaining personal data from European citizens, you will need to strongly consider obtaining certification under the new Privacy Shield framework. Certification began in August 2016, and will make compliance with EU privacy laws when transferring data to the U.S. possible for the immediate future.
March 02, 2017David F. KatzThis article familiarizes lawyers with cryptocurrency and, particularly, the enabling blockchain technology, methodologies and systems. It also introduces lawyers to blockchain's current and future uses and points to other resources to learn more about this profoundly disruptive and promising collection of technological advancements.
March 02, 2017Emile Loza de SilesThe Regulation was designed to promote the protection of customer information as well as the underlying information technology systems of regulated entities in light of the ever-increasing threat of cyber attacks.
March 02, 2017Elizabeth B. Vandesteeg and Kathryn C. NadroWith so many warnings to lawyers about transmitting unsecured email and attachments, it can be difficult to understand the solutions available and how they differ. Some may improve security but make communications cumbersome. If too cumbersome, users seek a way to work around them or choose less powerful tools.
March 02, 2017Nina CunninghamAn Exploration of the Modern Cyberespionage Threat and How In-House Legal Departments Are Fighting Back
Though faced with limited legal remedies, counsel are coming up with creative new ways to go after cyberespionage actors, and partnering with an array of cyber professionals and government agencies to combat the threat.
March 02, 2017Ricci DipshanLegal departments for business organizations rate cybersecurity, regulation and ethics compliance among their chief concerns, and they are well aware of surveys showing law firms to be the "soft underbelly" of business security due to weakness of their cybersecurity.
March 02, 2017Jerry CohenThe more we understand about how data breach incidents originate and propagate, the more likely we are to shift focus from outsider hackers to insider (employee) threats. Insider threats can be malicious, but often they are accidental.
March 02, 2017Sam Chi










