Features
The Human Factor In Information Security
No one can deny that cyberattacks are the new norm. Such risks will increasingly challenge our ability to operate our businesses. In the world of cybercrime, everyone — from individuals to nation-states — is a target. However, some targets are more alluring than others.
Features
What Lawyers Can Learn from Uber, Redux
Lawyers need to know what the client wants and how to get them there before the process starts. Just like a driver who doesn't know exactly where he's taking his riders, a lawyer who isn't totally sure what a client wants — let alone how to get them there efficiently and effectively — is likely to end up with a client who is disgruntled.
Features
The Human Factor In Information Security
No one can deny that cyberattacks are the new norm. Such risks will increasingly challenge our ability to operate our businesses. In the world of cybercrime, everyone — from individuals to nation-states — is a target. However, some targets are more alluring than others.
Features
<b><i>Online Extra</b></i><br>Chinese Nationals Charged With Hacking Firms to Steal M&A Info
Three Chinese nationals face federal charges for allegedly hacking into two major U.S. law firms in a scheme to trade on information about imminent mergers and acquisitions.
Features
New York Releases Updated Proposed Cybersecurity Regulation
Minimum standards proposed in September have been updated to provide more wiggle room for banks, financial institutions and insurance companies operating in New York.
Features
PODCAST: Is 'Little Data' More of a Concern than Big Data?
In the first of a series, Jason Thomas, Chief of Innovation for Thomson Reuters Special Services, discusses the difference between big data and "little…
Features
<b><i>BREAKING NEWS</b></i> <br> Chicago's Johnson & Bell First U.S. Firm Publicly Named in Data Security Class Action
In the first public data security class action complaint against a U.S. law firm, Chicago-based Johnson & Bell was named in a lawsuit that says the firm failed to protect confidential client information.
Features
Cyberinsurance Considerations for Law Firms
Law firms spend a lot of time and effort to protect their clients' interests, but often overlook routine protection and security of clients' (and their own) data. While not a cure-all for data security risks, one important component to consider in putting together a comprehensive data security program is cyber insurance, as most general liability policies and professional liability policies now expressly exclude coverage for data breach claims.
Features
China Passes Controversial Internet Security Law
The Standing Committee of the National People's Congress, China's top legislature approved the new Cybersecurity Law on November 7, which was created for reasons of national security and to curb internet fraud. It will take effect in June 2017.
Features
<b><i>Online Extra</b></i><br>Financial Industry Groups Slam NY's Proposed Cybersecurity Rules
Major banking and insurance industry groups are attacking New York's proposed regulation requiring member companies to adopt stringent protections against cyberattacks that compromise consumers' confidential information.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- Surveys in Patent Infringement Litigation: The Next FrontierMost experienced intellectual property attorneys understand the significant role surveys play in trademark infringement and other Lanham Act cases, but relatively few are likely to have considered the use of such research in patent infringement matters. That could soon change in light of the recent admission of a survey into evidence in <i>Applera Corporation, et al. v. MJ Research, Inc., et al.</i>, No. 3:98cv1201 (D. Conn. Aug. 26, 2005). The survey evidence, which showed that 96% of the defendant's customers used its products to perform a patented process, was admitted as evidence in support of a claim of inducement to infringe. The court admitted the survey into evidence over various objections by the defendant, who had argued that the inducement claim could not be proven without the survey.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
