After discovering that 2.4 million of its customers had partial driver's license information stolen, Equifax will likely face renewed questions over the handling of its post-breach internal investigation.
- March 07, 2018Rhys Dipshan
The law — which includes data localization mandates, cybersecurity best practices, and data transfer restrictions — has similarities to other cyber laws such as the EU's General Data Protection Regulation (GDPR). But in this case, it's also being used to police internet content and behavior.
March 01, 2018Rhys DipshanUber has incurred significant legal and reputational exposure as a result of the way that the company handled the breach. In the coming months, there will be a great deal of information and regulatory and judicial action that will act as guidance, or more precisely, a checklist of what-not-to-do, for companies that suffer a data breach.
January 01, 2018Paige BoshellA new legal structure that bestows and monitors trust must be employed. Is decentralization of traditional, gigantic central bank repositories of data the answer? Is blockchain technology the new path that the legal industry should take to sustain in the digital age? Let us consider the most significant implications of decentralized technologies to the legal industry.
January 01, 2018Dmitry DontsovPart Two of a Two-Part Article
The proliferation of cryptocurrency and blockchain is being driven by the efficiencies and protections afforded to early adopters. The operational efficiencies and resulting cost savings are readily apparent in the financial services industry and are equally coveted by the entities trying to implement them and by the customers who will benefit from the implementation. However, neither party can fully enjoy these benefits without first understanding and overcoming the various regulatory hurdles.
January 01, 2018Craig Nazzaro, Brad Rustin and John JenningsCybersecurity is a hydra of complexity. Keeping a grasp on it requires constant re-education. What no one tells you: managing your company's cyber vulnerability demands a willingness for personal vulnerability. Being honest about our cyber risks is painful. And scary.
January 01, 2018April RunftThe importance of promoting brands and products on digital platforms has continued to grow as advertisers are learning how to use social media to reach out to specific populations by harnessing the power and goodwill of the people on these platforms that are popular with and influence particular niche groups of interest. These so-called “influencers” can have thousands, or even millions and tens of millions of followers. But when is the influencer an objective critic, and when is she a paid spokesperson?
January 01, 2018Alan Friel and Stephanie LucasPanelists at ALM Cybersecure 2017 Delved Into the Year's Biggest Legal Technology Buzzwords and the Hype Fueling Their Popularity
Legal technology has no shortage of buzzwords. The latest slew to take the industry by storm were the topic conversation in a Dec. 5 panel at ALM's CyberSecure event in New York.
January 01, 2018Ian LopezThe growing acceptance of biometric data as a form of identification for employees means that many employers will likely have to face issues covered in state legislation in the immediate future.
January 01, 2018Hanley Chew and Eric BallSince the start of the digital media era, content industries have engaged in a tug-of-war with courts over whether the identity of defendants accused of violating plaintiffs' rights, via online distribution, can be revealed.
January 01, 2018Stan Soocher










