Account

Sign in to access your account and subscription

Technology Media and Telecom

  • In a newsworthy case in which retail giant Amazon and social media developer Foursquare Labs, among others, submitted friend of the court briefs, the New York Court of Appeals affirmed decisions which denied Facebook's motion to quash warrants issued to it by the Manhattan District Attorney's Office and denied Facebook's motion to compel disclosure of the district attorney's supporting affidavit to its warrant application.

    May 02, 2017Maurice J. Recchia
  • The Repeal May Open Up ISPs to Future Legal Challenges on How and When They Can Sell Their Customer's Private Data

    While the recent repeal of the Federal Communications Commissions' (FCC) broadband privacy rules have caused an uproar over what many may see as lagging federal data privacy protections, it does little to change how broadband ISPs handle their users' data.

    May 02, 2017Rhys Dipshan
  • Advances in technology and software are being made at an increasingly rapid pace. As a result, IT hardware obsolescence cycles are shrinking too. This period of exponential improvement with which we are all now familiar has shown time and again that there will continue to be breakthroughs in technology that deliver better, less expensive, and/or more robust products. How are you equipping your firm to succeed both in the present day and into the future?

    May 01, 2017Scott McFetters
  • When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft-of-IP analysis in order to preserve electronic data and uncover important evidence.

    April 02, 2017Timothy M. Opsitnick, Joseph M. Anguilano and Trevor B. Tucker
  • Part One of a Three-Part Article

    There are stark differences between e-discovery and cybersecurity, most notably that cybersecurity, as an avenue of career opportunity and responsibility, is much, much bigger. An examination of the current state of both industries coupled with a deep dive into the history of e-discovery will offer a prophetic look at the likely hiring patterns, job availability, compensation trends, and industry maturation of the cybersecurity vertical over the next decade.

    April 02, 2017Jared Coseglia
  • Perimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.

    April 02, 2017Ian Raine
  • Many organizations are changing their approach to leveraging cybersecurity intelligence through enhanced cooperation, detailed information sharing, and broad-based collaboration. To characterize those shifts and offer perspectives that empower effective benchmarking, for the third consecutive year, Nuix engaged my firm to interview corporate security officials. The report reflects the perspectives of 29 cybersecurity executives across a range of industries.

    April 02, 2017Ari Kaplan