The growing acceptance of biometric data as a form of identification for employees means that many employers will likely have to face issues covered in state legislation in the immediate future.
- January 01, 2018Hanley Chew and Eric Ball
The Internet's value arises in part from its ability to provide images, data and content quickly and at little cost. This ability results from the fact that Internet products — whether they be images, data or content — are each reduced to a digital format. Sharing products that have been so reduced may result in product liability.
January 01, 2018Jonathan BickAt law firms and legal departments, preparing for the new year should mean looking back at the last year and prioritizing revenue-driving activities, identifying strategies to grow your firm or company while mitigating risk and budgeting for new projects to meet client demands.
January 01, 2018Jeff TonIn the event that your company is the victim of a ransomware attack, this article provides steps to be taken as part of its response to such an incident. It is meant to be a helpful guide, but the best response generally will depend on different factors, including the scope and severity of the attack, availability of remediation measures, and business sensitivities.
January 01, 2018Kiran Raj and Mallory JensenThe preference of the parties involved, even if reduced to writing, is rarely determinative of employment status. Instead, the specifics of the relationship will govern.
January 01, 2018Brian D. MurphyIn the First Enforcement Action Initiated By Its New “Cyber Unit,” the SEC Announced It Has Secured a Court Order to Freeze the Assets of Individuals Behind a “Scam” Initial Coin Offering
In the first enforcement action initiated by its new “Cyber Unit,” the Securities and Exchange Commission (SEC) recently announced it has secured a court order to freeze the assets of individuals behind a “scam” initial coin offering, or ICO.
January 01, 2018Ben HancockSocial media evidence can be acquired both informally — through an attorney's own investigation or from the client — or more formally through the use of discovery and the rules of discovery. While each gives rise to practical and ethical issues, this section will focus on informal methods of acquisition.
January 01, 2018Khizar A. Sheikh, Lynne Strober and Jennifer PrestiIn September 2015, then-Director of National Intelligence James Clapper warned that the next "push of the envelope" in cybersecurity might be attacks that change or manipulate electronic information in order to compromise its accuracy or reliability. Two years later, we may now be seeing the beginning of such insidious attacks, in the context of GPS spoofing — a technique that sends false signals to systems that use GPS signals for navigation.
December 01, 2017Michael Bahar, Bronwyn McDermott and Trevor J. SatnickPart One of a Two-Part Article
As we head into 2018, cryptocurrency and blockchain will continue to be a top initiative for pioneers in the financial services industry. As with any innovation within the financial services industry, the regulators are never far behind and are doing their best to keep up. Those that enter this space will find that they also have to pioneer the controls to manage the regulatory risks this technology presents.
December 01, 2017Craig Nazzaro, Brad Rustin and John JenningsMany corporations around the globe are preparing for May 2018, when Europe's General Data Protection Regulation (GDPR) enforcement kicks in. The regulation encompasses a wide range of nuanced privacy requirements that can be challenging to operationalize. In particular, requirements around the rights of European data subjects — which include the right to be forgotten and rights to access, rectification and objection to processing — will be some of the most difficult to address.
December 01, 2017Sonia Cheng, Eckhard Herych, and Richard MacDonald











