Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Blockchain and GDPR — Frenemies? Image

Blockchain and GDPR — Frenemies?

Justin Hectus & Kristy Sambor

In a nutshell, GDPR mandates that individuals have access and control over the use and maintenance of their data in certain circumstances, while the foundation of blockchain relies on the immutability of data. On the surface, these concepts seem in direct conflict with each other. This article discusses the points where GDPR and blockchain share common ground, where conflicts may exist and possible approaches for mitigating those conflicts.

Features

Why Encryption Is the Key to Ensure Data Privacy in the Cloud Image

Why Encryption Is the Key to Ensure Data Privacy in the Cloud

Linus Chang

At both a personal and corporate level, there are huge gains to be made in protecting against data breaches. The fact is that well-implemented client-side encryption — where the corporate user keeps their own key rather than entrusting a third party to guard their sensitive information — is the only sure way to guarantee data privacy when storing data on other people's servers.

Features

This is Not Your Father's Cloud (Part Two) Image

This is Not Your Father's Cloud (Part Two)

Adam Cohen

<b><i>Part Two of a Two-Part Article</b></i><p>In Part One of this article last month, we began a discussion designed to demystify the hesitations behind cloud security and analyzed the fast-growing transformation to a range of newer technical approaches with important consequences for legal practice. This month we continue the discussion by tackling the security and legal implications of the mass transformation of enterprise IT to cloud services from leading providers such as AWS and Azure.

Features

Balancing Fourth Amendment Expectations in the Electronic Era Image

Balancing Fourth Amendment Expectations in the Electronic Era

Jonathan S. Feld, Dante Stella & Christina Brunty

As rapid technological changes in the 21st century continue to expand the types and volume of private electronic information, the Fourth Amendment's privacy protections are evolving. The critical question in Fourth Amendment cases is whether a person has a “reasonable expectation of privacy in the information or event.”

Features

In-House Counsel's Growing Role in Data Protection and Security Risk Management Image

In-House Counsel's Growing Role in Data Protection and Security Risk Management

Deana Uhl

<b><I>Building an Intelligence-Led Program</b></i><p>With reports of major breaches surfacing with alarming frequency, boards and C-Level management are now looking to counsel to implement programs that help the corporation prepare for, quickly recover and reduce fallout from, inevitable cyber incidents. In-house counsel is facing growing responsibility to minimize damage to the corporate reputation, loss of key data, and legal and regulatory penalties. And many worry their organization is stuck in a game of catch-up.

Features

The End of the Privacy Shield? Image

The End of the Privacy Shield?

Eric Levy

If the U.S. cannot come to an understanding with the European Parliament by September 1, companies that already participate in Privacy Shield may find themselves in limbo. But there are options.

Features

Online Extra: Just How Far Will the Supreme Court's 'Carpenter' Opinion Reverberate? Image

Online Extra: Just How Far Will the Supreme Court's 'Carpenter' Opinion Reverberate?

Rhys Dipshan

The ruling restricting the collection of historical cell site location information (CSLI) without a warrant aims to be narrow in scope, but legal experts argue it may have repercussions for years to come.

Features

Security Breach Responses — As Important and Difficult As Ever Image

Security Breach Responses — As Important and Difficult As Ever

Bart A. Lazar

The confusing and conflicting world of contractual requirements and personal data security breach notification laws can add insult and expense to injury, and sometimes adds injury itself. Tough -- and sometimes expensive -- choices need to be made quickly.

Features

The Power of Certifications in Legal Image

The Power of Certifications in Legal

Jared Coseglia

<b><i>Part Two of a Two-Part Article</b></i><p>Professionals in e-discovery and privacy, including lawyers, are hungry for growth opportunities and may be ripe to transition into certain security-centric positions; however, the security job landscape is far more expansive and far less commoditized than ESI or privacy — for now. Part Two provides a road map for how certifications can assist an individual or an organization in reinventing, repurposing, creating or maintaining cybersecurity talents.

Features

Online Extra: The Evolving Nature of Cyber Law Image

Online Extra: The Evolving Nature of Cyber Law

Gabrielle Orum Hernández

<b><i>A Q&A with Penn Law Prof. Anne Toomey McKenna</b></i><p>The newly appointed Penn State professor sees a lot of room for questions in the evolving cyber law landscape, but so far there are few answers.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategic Uses of a Rule 2004 Exam
    While most bankruptcy practitioners are familiar with the basic concepts behind the Rule 2004 exam, some are less familiar with the procedural intricacies of obtaining, conducting, and responding to the exam ' intricacies that often involve practices and procedures adapted from civil discovery that are beyond the scope of pure bankruptcy practice. This article explains.
    Read More ›