Features
Presidential Cybersecurity Handoff
Given the pending change in administration and uncertainty around President-elect Trump's priorities on cybersecurity, an analysis of the current federal cyber landscape may yield insights into how the next administration might prioritize their approach on this important front.
Features
Internet Law in a Trump Presidency
President Trump is already being pressured to reverse President Obama's Open Internet Order (also known as “net neutrality”) and take an aggressive stance against it. It remains to be seen how President Trump will balance the call for privacy regulations amidst our country's vulnerability to cyber-attacks.
Features
Most Firms Feel Assured in Cybersecurity Abilities, But Is That False Confidence?
Law firms are increasingly confident in their cybersecurity capabilities, despite many falling short of adequate breach response preparation.
Features
Practical Approaches to the EU-US Privacy Shield
This article discusses the corporate impact of the EU-US Privacy Shield and practical approaches to managing global corporate data in the wake of <i>Schrems</i>.
Features
In Light of Recent FTC Actions, Review Your Privacy Policy
The United States does not have comprehensive legislation addressing the privacy implications of the collection and use of geolocation data. However, the Federal Trade Commission (FTC) has used its enforcement authority under Section 5 of the FTC Act to regulate companies engaged in unfair or deceptive practices involving geolocation data.
Features
WhatsApp, Encryption and the Battle with Law Enforcement
It is widely accepted that much of today's communications are digital — and as a result, the encryption of data, the privacy laws governing that data, and the role that governments play when national security and law enforcement issues are at stake is a very hot topic.
Features
The Human Factor In Information Security
No one can deny that cyberattacks are the new norm. Such risks will increasingly challenge our ability to operate our businesses. In the world of cybercrime, everyone — from individuals to nation-states — is a target. However, some targets are more alluring than others.
Features
The Human Factor In Information Security
No one can deny that cyberattacks are the new norm. Such risks will increasingly challenge our ability to operate our businesses. In the world of cybercrime, everyone — from individuals to nation-states — is a target. However, some targets are more alluring than others.
Features
Managing Risk in Light of 'Shadow IT'
Information Governance in the Age of Cloud Application Proliferation
Features
Sixth Circuit's Decision on Privacy Claims over Data Breaches
Data breaches such as the one Yahoo recently revealed (500 million accounts!) get the big headlines. In response, large companies double down on their efforts to protect the security of their data. But small to midsize businesses often fail to appreciate the risk of a data breach to their own business.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The Problem With Sup. Ct. Majority Opinion In Andy Warhol FoundationCommentary The high court's decision's future application is anything but clear and clarification of the parameters of a "transformative" fair use is left open for another day.Read More ›
- Navigating the Attorney-Client Privilege and Work Product Doctrine in BankruptcyWhen a company declares bankruptcy, avoidance actions under Chapter 5 of the Bankruptcy Code can assist in securing extra cash for the debtor's dwindling estate. When a debtor-in-possession does not pursue these claims, creditors' committees often seek the bankruptcy court's authorization to pursue them on behalf of the estate. Once granted such authorization through a “standing order,” a creditors' committee is said to “stand in the debtor's shoes” because it has permission to litigate certain claims belonging to the debtor that arose before bankruptcy. However, for parties whose cases advance to discovery, such a standing order may cause issues by leaving undecided the allocation of attorney-client privilege and work product protection between the debtor and committee.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
