In 2019, regulations and laws will continue to define how businesses collect and use consumer data, and their obligations to protect this data from misuse, theft or exposure to unauthorized parties.
Brian Ellman and Jee-Yeon Lehmann
Demonstrating that a data breach has resulted in an injury-in-fact can be difficult, because it is not always clear what has happened or will happen with the stolen data.
This article discusses the importance of securing a safe harbor for court records through reviewing an illustrative example of how a European Union (EU) citizen was able to force U.S. legal technology companies to remove and alter court records using GDPR.
In-house legal operations chiefs see their main priorities as managing legal technology and cost-cutting, primarily on outside counsel spending. Blockchain remains a confusing concept to them, while artificial intelligence is the hottest topic of conversation.
The Hacker Group Wants Ransom Payments from Dozens of Firms Involved In the Sept. 11 Litigation, and Experts Warn That More Attacks Are Coming
Leaders of those law firms are all likely scratching their heads about how to handle a recent announcement from a nebulous hacker entity calling itself the “Dark Overlord,” which claims to be in possession of 18,000 legal and insurance documents pertaining to the court fight.
Spencer X. Smith
In just one hour, would it be valuable to have at least nine pieces of content that your lawyer clients may use on your website and on social media?
Jeffrey Higel, Michael Bahar and Mike Nelson
As convenient, useful and cool mobile technology and interconnected devices are, they come with risks that remain largely unseen or, worse, ignored. Some…
Richard J. Mason
This article looks at some of the issues that may arise if a cryptocurrency exchange becomes a debtor in a case under the Bankruptcy Code.
2018 was a trying year for the cybersecurity industry, with breaches increasing and showing no signs of slowing as we enter the New Year. 2019 will bring its own threats with the propagation of new technology — 5G and IoT — and their security vulnerabilities. However, there’s also progress on the horizon, thanks to more stringent government regulation and increasing legal action.
Ronald Cheng and Mallory Jensen
For years, the U.S. has maintained an active enforcement campaign against overseas cyber criminals and while these past efforts have not been haphazard, they have not necessarily been part of a specific drive to address the serious issue of foreign cybercrime committed by nation states. Recent announcements by the DOJ show that this enforcement campaign is accelerating and expanding.