Features
Back in the GDPR
Any company operating globally should protect its value through exposure containment under both privacy shield and the forthcoming GDPR.
Features
What You Need to Know to Get Started with Privacy Shield Certification
If your company maintains operations in the European Union or is U.S. based but obtaining personal data from European citizens, you will need to strongly consider obtaining certification under the new Privacy Shield framework. Certification began in August 2016, and will make compliance with EU privacy laws when transferring data to the U.S. possible for the immediate future.
Features
Is Your Law Firm Running 'Encryption Light?'
With so many warnings to lawyers about transmitting unsecured email and attachments, it can be difficult to understand the solutions available and how they differ. Some may improve security but make communications cumbersome. If too cumbersome, users seek a way to work around them or choose less powerful tools.
Features
Building a Business Case for a Data Privacy Program
When members of the Compliance, Governance and Oversight Council (CGOC) discuss data privacy and security today, I see an entirely new level of urgency.…
Features
Search Warrants for IoT Data Spur Legal, Privacy Complications
<b><i><font size="-1"> Law Enforcement Attempts to Access Amazon Echo Raise Questions over the Viability of IoT Data in Investigations and the Vulnerability of Private Information</b></i></font><p>A case surrounding a mysterious death in a Benton County, AR, has far-reaching implications for the ownership and privacy of data generated from Internet-connected devices.
Features
<i>Online Extra</i><br>DOL Sues Google Over Failure to Provide Compensation Data
The Department of Labor (DOL) is asking an administrative law judge to order the company to turn over information on job and salary history for employees…
Features
Virtual Snooping
The modern-day snoop is all too often someone you know. If this consideration doesn't leave you paranoid and looking over your shoulder, it should.
Features
Presidential Cybersecurity Handoff
Given the pending change in administration and uncertainty around President-elect Trump's priorities on cybersecurity, an analysis of the current federal cyber landscape may yield insights into how the next administration might prioritize their approach on this important front.
Features
Internet Law in a Trump Presidency
President Trump is already being pressured to reverse President Obama's Open Internet Order (also known as “net neutrality”) and take an aggressive stance against it. It remains to be seen how President Trump will balance the call for privacy regulations amidst our country's vulnerability to cyber-attacks.
Features
Most Firms Feel Assured in Cybersecurity Abilities, But Is That False Confidence?
Law firms are increasingly confident in their cybersecurity capabilities, despite many falling short of adequate breach response preparation.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- When It Comes to Trademark Searches, AI Misses the MarkArtificial intelligence tools powered by large language models have become valuable resources in the trademark process. Despite incredible progress in natural-language reasoning, AI tools still face fundamental limitations when it comes to performing even basic trademark searches. Here are five important reasons why.Read More ›
