We found 1,223 results for "Cybersecurity Law & Strategy"...
The Cyber Shot Across the Bow: Data Manipulation and GPS Spoofing
December 01, 2017
In September 2015, then-Director of National Intelligence James Clapper warned that the next "push of the envelope" in cybersecurity might be attacks that change or manipulate electronic information in order to compromise its accuracy or reliability. Two years later, we may now be seeing the beginning of such insidious attacks, in the context of GPS spoofing — a technique that sends false signals to systems that use GPS signals for navigation.
Regulators Are Catching Up to Cryptocurrency and Blockchain Technology within the Financial Services Industry
December 01, 2017
<b><i>Part One of a Two-Part Article</b></i><p>As we head into 2018, cryptocurrency and blockchain will continue to be a top initiative for pioneers in the financial services industry. As with any innovation within the financial services industry, the regulators are never far behind and are doing their best to keep up. Those that enter this space will find that they also have to pioneer the controls to manage the regulatory risks this technology presents.
Five Smart Steps to Prepare for GDPR Data Subject Rights
December 01, 2017
Many corporations around the globe are preparing for May 2018, when Europe's General Data Protection Regulation (GDPR) enforcement kicks in. The regulation encompasses a wide range of nuanced privacy requirements that can be challenging to operationalize. In particular, requirements around the rights of European data subjects — which include the right to be forgotten and rights to access, rectification and objection to processing — will be some of the most difficult to address.
Artificial Intelligence: Knowing When It's Right for Your Firm
December 01, 2017
Gone are the days when being the best lawyer was enough to guarantee landing and retaining clients. Clients are demanding that firms incorporate automation and increase their efficiency. Clients are relying on automation to streamline the work they outsource, and they expect their law firms to follow suit. To this end and to remain competitive, law firms need to offer their clients innovative solutions and build artificial intelligence (AI) into the core fabric of their practices.
NY AG Proposes Stricter Data Security Laws Citing Equifax Breach
December 01, 2017
Following the Equifax Inc. breach that compromised personal information of 145.5 million Americans including more than 8 million New Yorkers, Attorney General Eric Schneiderman is proposing comprehensive legislation to tighten data security laws
Data Integrity and Incident Response
December 01, 2017
The skill required to successfully exfiltrate 143 million records is certainly sufficient to successfully attack the integrity of that very same data. It is generally accepted that cyber criminals have not performed integrity attacks because there is a minimal profit motive: Records have a black-market value; in integrity attacks, there is no deliverable that can be sold. This paradigm may be shifting.
Uber In-House Attorney Out Behind Massive Cyberattack That Went Undisclosed
December 01, 2017
<b><i>The Company Failed to Notify 57 Million Users of a Breach In October 2016. Two Employees Tasked with Handling the Response Process Have Left the Company, Including Uber In-House Attorney Craig Clark, Who Reported to the Company's Chief Security Officer.</b></i><p>Uber Technologies Inc. failed to notify 57 million users that their data was exposed in a breach, according to a company blog post published on November 21, which was confirmed by a source close to the matter.
<b><i>Legal Tech</b></i><br>Circumstantial Evidence vs. Speculation: What Warrants e-Discovery Sanctions
December 01, 2017
In today's political climate, it has almost become "normal" that people frivolously make speculative statements without any proof that the statement is true. While this may be standard practice in the political world, in court this practice will not be convincing to any judge, especially when making an argument for e-discovery sanctions based on new rule FRCP 37(e).
Five Smart Steps to Prepare for GDPR Data Subject Rights
December 01, 2017
Many corporations around the globe are preparing for May 2018, when Europe's General Data Protection Regulation (GDPR) enforcement kicks in. The regulation encompasses a wide range of nuanced privacy requirements that can be challenging to operationalize. In particular, requirements around the rights of European data subjects — which include the right to be forgotten and rights to access, rectification and objection to processing — will be some of the most difficult to address.
What Lies Beneath the Surface: The Dark Web
December 01, 2017
Nearly all of us access the World Wide Web on at least a daily basis. Yet for many of us, there is a fundamental lack of knowledge about the basic structure of the Internet and the way its different levels interact. This article provides a basic outline of the structure of the Web and some insight as to the purpose for and content housed on each level, as well as give some practical tips to avoid your company's data from ending up on the Dark Web.
MOST POPULAR STORIES
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- The Anti-Assignment Override ProvisionsUCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?Read More ›