Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

The Cyber Shot Across the Bow: Data Manipulation and GPS Spoofing Image

The Cyber Shot Across the Bow: Data Manipulation and GPS Spoofing

Michael Bahar, Bronwyn McDermott & Trevor J. Satnick

In September 2015, then-Director of National Intelligence James Clapper warned that the next "push of the envelope" in cybersecurity might be attacks that change or manipulate electronic information in order to compromise its accuracy or reliability. Two years later, we may now be seeing the beginning of such insidious attacks, in the context of GPS spoofing — a technique that sends false signals to systems that use GPS signals for navigation.

Features

Regulators Are Catching Up to Cryptocurrency and Blockchain Technology within the Financial Services Industry Image

Regulators Are Catching Up to Cryptocurrency and Blockchain Technology within the Financial Services Industry

Craig Nazzaro, Brad Rustin & John Jennings

<b><i>Part One of a Two-Part Article</b></i><p>As we head into 2018, cryptocurrency and blockchain will continue to be a top initiative for pioneers in the financial services industry. As with any innovation within the financial services industry, the regulators are never far behind and are doing their best to keep up. Those that enter this space will find that they also have to pioneer the controls to manage the regulatory risks this technology presents.

Features

Five Smart Steps to Prepare for GDPR Data Subject Rights Image

Five Smart Steps to Prepare for GDPR Data Subject Rights

Sonia Cheng, Eckhard Herych, & Richard MacDonald

Many corporations around the globe are preparing for May 2018, when Europe's General Data Protection Regulation (GDPR) enforcement kicks in. The regulation encompasses a wide range of nuanced privacy requirements that can be challenging to operationalize. In particular, requirements around the rights of European data subjects — which include the right to be forgotten and rights to access, rectification and objection to processing — will be some of the most difficult to address.

Features

Artificial Intelligence: Knowing When It's Right for Your Firm Image

Artificial Intelligence: Knowing When It's Right for Your Firm

Arup Das

Gone are the days when being the best lawyer was enough to guarantee landing and retaining clients. Clients are demanding that firms incorporate automation and increase their efficiency. Clients are relying on automation to streamline the work they outsource, and they expect their law firms to follow suit. To this end and to remain competitive, law firms need to offer their clients innovative solutions and build artificial intelligence (AI) into the core fabric of their practices.

Features

NY AG Proposes Stricter Data Security Laws Citing Equifax Breach Image

NY AG Proposes Stricter Data Security Laws Citing Equifax Breach

Josefa Velasquez

Following the Equifax Inc. breach that compromised personal information of 145.5 million Americans including more than 8 million New Yorkers, Attorney General Eric Schneiderman is proposing comprehensive legislation to tighten data security laws

Features

Data Integrity and Incident Response Image

Data Integrity and Incident Response

Benjamin Dynkin, Barry Dynkin & E.J. Hilbert

The skill required to successfully exfiltrate 143 million records is certainly sufficient to successfully attack the integrity of that very same data. It is generally accepted that cyber criminals have not performed integrity attacks because there is a minimal profit motive: Records have a black-market value; in integrity attacks, there is no deliverable that can be sold. This paradigm may be shifting.

Features

Uber In-House Attorney Out Behind Massive Cyberattack That Went Undisclosed Image

Uber In-House Attorney Out Behind Massive Cyberattack That Went Undisclosed

Stephanie Forshee & Jennifer Williams-Alvarez

<b><i>The Company Failed to Notify 57 Million Users of a Breach In October 2016. Two Employees Tasked with Handling the Response Process Have Left the Company, Including Uber In-House Attorney Craig Clark, Who Reported to the Company's Chief Security Officer.</b></i><p>Uber Technologies Inc. failed to notify 57 million users that their data was exposed in a breach, according to a company blog post published on November 21, which was confirmed by a source close to the matter.

Features

<b><i>Legal Tech</b></i><br>Circumstantial Evidence vs. Speculation: What Warrants e-Discovery Sanctions Image

<b><i>Legal Tech</b></i><br>Circumstantial Evidence vs. Speculation: What Warrants e-Discovery Sanctions

Mike Hamilton

In today's political climate, it has almost become "normal" that people frivolously make speculative statements without any proof that the statement is true. While this may be standard practice in the political world, in court this practice will not be convincing to any judge, especially when making an argument for e-discovery sanctions based on new rule FRCP 37(e).

Features

Ransomware: What to Do When It Happens to You Image

Ransomware: What to Do When It Happens to You

Kiran Raj & Mallory Jensen

In the event that your company is the victim of a ransomware attack, this article provides steps to be taken as part of its response to such an incident.

Features

Security First Approach Provides a Significant Advantage to Law Firms Image

Security First Approach Provides a Significant Advantage to Law Firms

Mark Sangster

Security first is a holistic approach that views security not as an information technology nuisance in need of tight cost-management controls, but as a competitive advantage to differentiation from traditional business offerings. Here's what you need to know.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES