Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Federal and State Cybersecurity Regulation of Financial Services Firms Image

Federal and State Cybersecurity Regulation of Financial Services Firms

Brian Neil Hoffman, Romaine Marshall & Matt Sorensen

Two states recently enacted or proposed rules for financial services firms. This may be just the beginning of a national trend toward increased state regulation of cybersecurity matters. Financial services firms and their management should be prepared to proactively address the shifting regulatory landscape as it continues to evolve.

Features

<i><b>Online Extra:</b></i><br>Target to Pay $18.5M to States over Data Breach Image

<i><b>Online Extra:</b></i><br>Target to Pay $18.5M to States over Data Breach

P.J. D'Annunzio

Retail giant Target has agreed to pay a total of $18.5 million in a settlement with 47 states over a 2013 consumer data breach that resulted in over 100 million pieces of credit card or personal information being stolen by hackers.

Features

The State of Data Breach Litigation and How to Avoid It Image

The State of Data Breach Litigation and How to Avoid It

Aaron D. Charfoos & Sean C. Griffin

The number of records compromised in data breaches in 2016 increased an astounding 86% over 2015 breaches. This has led to numerous data breach litigations in the civil and regulatory context. What are the major cases and trends from 2016? And what can organizations do to try to reduce their risks of breaches and litigations?

Features

State of the Industry: E-Discovery and Cybersecurity Image

State of the Industry: E-Discovery and Cybersecurity

Jared Coseglia

<b><i>Part Two of a Three-Part Article</b></i><p>Examining the current similarities between e-discovery and cybersecurity and details how the history of e-discovery mirrors the present of cybersecurity and is a predictor of future patterns in the cybersecurity staffing market.

Features

Using Computer Forensics to Investigate Employee Data Theft Image

Using Computer Forensics to Investigate Employee Data Theft

Timothy M. Opsitnick, Joseph M. Anguilano & Trevor B. Tucker

Departing employees have a sense of ownership over the data that they copy. Intellectual property commonly stolen includes customer lists, secret formulas, source code, strategy documents and other trade secrets. The information is often used against the organization when the former employee goes to work for a competitor or decides to start a new company.

Features

The Challenge of Complying with China's New Cybersecurity Law Image

The Challenge of Complying with China's New Cybersecurity Law

Dan Whitaker

In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. The law is set to go into effect June 1, 2017. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.

Features

The Challenge of Complying with China's New Cybersecurity Law Image

The Challenge of Complying with China's New Cybersecurity Law

Dan Whitaker

In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. The law is set to go into effect June 1, 2017. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.

Features

The Top-Five Critical Security Controls to Consider for Corporate Counsel Evaluations Image

The Top-Five Critical Security Controls to Consider for Corporate Counsel Evaluations

Joe Kelly

Corporations consider many different factors when deciding whether to hire a law firm. Security wasn't usually a major factor, and law firms used to fly under the radar when it came to questions about keeping client data secure. That has all changed.

Features

The GDPR: Teeth, and Considerations for Corporate Legal Counsel and Discovery Teams Image

The GDPR: Teeth, and Considerations for Corporate Legal Counsel and Discovery Teams

Ryan Costello

With the EU's General Data Protection Regulation (GDPR) set to take effect in May of 2018, the serious implications for corporate legal counsel and e-discovery teams are difficult to deny.

Features

Where Is the Digital-Age Sweet Spot Between Business Growth and Data Security? Image

Where Is the Digital-Age Sweet Spot Between Business Growth and Data Security?

Sanjiv Bawa

In this heady atmosphere, law firms risk succumbing to the temptation — indeed, the seeming necessity — to exploit to the hilt the Internet's huge upside — its massive growth and profit potential — while neglecting its huge downside: its immense threats to data security.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES