This is not the first time that a credit reporting agency has been breached, nor is it the first time that Equifax has reported a breach. What is different with the current breach is its size and the nature of information compromised, as well as the implications of the breach in light of the increasingly complex web of cybersecurity regulations nationwide.
- October 02, 2017F. Paul Greene
With 143 million people potentially hit by Equifax Inc.'s data breach, there's no doubt there will lawsuits — a lot of them."You'll have suits in…
October 02, 2017Amanda BronstadThe Debate Continues
Web "scraping" is one method of accumulating data that has sparked recent legal debate, both antitrust and otherwise. Legal challenges to Web scraping have involved privacy claims and claims under the federal Computer Fraud and Abuse Act, in addition to antitrust claims about the need to collect public data to be able to compete freely.
October 02, 2017Shepard Goldfein and James KeyteEven the Securities and Exchange Commission (SEC) can get hacked — and the recently announced cyber attack against the SEC is providing an important wake-up call for U.S. companies regulated by the powerful agency and the attorneys they work with.
October 02, 2017Ed SilversteinPart One of a Two-Part Article
Personal assistants, fitness trackers, and automotive black boxes are among the devices whose data and metadata may have big impact in legal cases. Here's why.
October 02, 2017Michael CiaramitaroIn an effort to continue to capture ongoing and new business, vendors may be opening themselves up to liability due to poorly drafted contracts with companies. In addition, in a rush by companies to have data shifted to the cloud, privacy concerns may be dangerously minimized.
September 02, 2017Chuck Kunz and Ian McCauleyInvestigating and Discovering Mobile Device Data
Analyzing data from mobile devices is still uncharted territory for many in Legal and IT. Accordingly, today's modern legal and technology professionals need to brush-up on all things mobile. This includes understanding where applicable data resides in a mobile device and what common challenges are associated with accessing, preserving and extracting this data. One such app taking the mobile device world by storm is WhatsApp.
September 02, 2017Julian Sheppard and Michele C.S. LangeHow to Protect Your Firm from Vendor Risks
The legal industry is still lulled into a false sense of security, mistakenly assuming that they are immune to a significant IT business outage, and that those unfortunate firms affected by cybercriminals were somehow lacking in adequate cybersecurity presages. That's simply not true. Even Achilles had a weak spot.
September 02, 2017Mark SangsterNext in a series of podcasts looking at the cybersecurity and tech world.
September 02, 2017Jason ThomasAnalyzing data from mobile devices is still uncharted territory for many in Legal and IT. Accordingly, today's modern legal and technology professionals need to brush up on all things mobile. This includes understanding where applicable data resides in a mobile device and what common challenges are associated with accessing, preserving and extracting this data.
September 02, 2017Julian Sheppard and Michele C.S. Lange









