Features

Security Breach Responses — As Important and Difficult As Ever
The confusing and conflicting world of contractual requirements and personal data security breach notification laws can add insult and expense to injury, and sometimes adds injury itself. Tough -- and sometimes expensive -- choices need to be made quickly.
Features

The Power of Certifications in Legal
<b><i>Part Two of a Two-Part Article</b></i><p>Professionals in e-discovery and privacy, including lawyers, are hungry for growth opportunities and may be ripe to transition into certain security-centric positions; however, the security job landscape is far more expansive and far less commoditized than ESI or privacy — for now. Part Two provides a road map for how certifications can assist an individual or an organization in reinventing, repurposing, creating or maintaining cybersecurity talents.
Features

Online Extra: The Evolving Nature of Cyber Law
<b><i>A Q&A with Penn Law Prof. Anne Toomey McKenna</b></i><p>The newly appointed Penn State professor sees a lot of room for questions in the evolving cyber law landscape, but so far there are few answers.
Features

Online Extra: Facebook's Blockchain Bet Could Place It in the Data Decentralization Debate
<i><b>Oft-Considered an Avenue for Individuals to Attain Greater Control over Their Digital Information, Blockchain Could Be Leveraged By Facebook to Change Its Status As “Gatekeeper” for User Data</i></b><p>Facebook Inc. recently announced that it will begin exploring different ways to incorporate blockchain into its infrastructure. Yet, questions remain over how the social media company will implement the technology and what sort of legal challenges doing so could portend.
Features

Are U.S. Records Retention Requirements on a Collision Course with the GDPR's 'Right to Erasure?'
U.S. laws require companies to retain records for years, and sometimes forever, and violating U.S. records retention laws can result in domestic fines and penalties. How can U.S. companies comply with the GDPR's “right to erasure” while still fulfilling their U.S. records retention obligations?
Features

Life in the (Regulated) Fast Lane: Companies Must Navigate Global Privacy Rules on Self-Driving Cars
<b><i>The race is on to develop the best technology for autonomous vehicles, but there are also drives to increase regulation around the data these cars and trucks collect.</b></i><p>Clearly, it's an exciting time to be in the autonomous car industry, and the race is on to develop the best tech first. But with an increasingly complex legal landscape, lawyers need to focus on compliance with evolving data privacy regulations.
Features

Corporate Counsel Are Tackling Their Data Risk All at Once: Can They Do It?
A new BDO study finds a lack of priorities in data-related spending could, eventually, leave companies overstretched.
Features

<i>Online Extra</i>: Equifax's Liabilities Pile on After Discovery of New Compromised Data
After discovering that 2.4 million of its customers had partial driver's license information stolen, Equifax will likely face renewed questions over the handling of its post-breach internal investigation.
Features

China's Cybersecurity Law Isn't Just About Cybersecurity
The law — which includes data localization mandates, cybersecurity best practices, and data transfer restrictions — has similarities to other cyber laws such as the EU's General Data Protection Regulation (GDPR). But in this case, it's also being used to police internet content and behavior.
Features

The Uber Breach and the Need for an Independent Privacy Function
Uber has incurred significant legal and reputational exposure as a result of the way that the company handled the breach. In the coming months, there will be a great deal of information and regulatory and judicial action that will act as guidance, or more precisely, a checklist of what-not-to-do, for companies that suffer a data breach.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- Why So Many Great Lawyers Stink at Business Development and What Law Firms Are Doing About ItWhy is it that those who are best skilled at advocating for others are ill-equipped at advocating for their own skills and what to do about it?Read More ›
- The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business AlliesPractical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.Read More ›
- Best Practices for Virtual Internal InvestigationsIn order to ensure that remote internal investigations are probative and effective, companies and their outside counsel should employ a few simple and practical practices.Read More ›
- Hiring Practices and the FCPAWhile laws such as the FCPA do not necessarily prohibit hiring individuals with criminal records or bad credit records or who are former government officials, they do require employers to identify these individuals and assess whether their hire would pose a threat, violate the laws outright or impose an administratively difficult burden due to the need to monitor their activities.Read More ›