Account

Sign in to access your account and subscription

Technology Media and Telecom

  • The FCC's move to stop Internet service providers from collecting customers' personal information without consent has itself been halted. The Senate voted 50-48 on March 24 to overturn the rules, with the House expected to follow suit.

    April 02, 2017Lora Hollien
  • Postings of comments or photographs become part of the permanent record on the Internet. There is no such thing as deleting a post or erasing the past. Because of the potentially adverse consequences, trial lawyers are now duty bound to run a thorough social media search of their clients, adversaries, and witnesses in every case. To the extent an attorney fails to conduct such a search, not only will she be at a severe disadvantage in the case but her competence as a trial lawyer can be called into question.

    April 02, 2017Ben Rubinowitz and Evan Torgan
  • Any company operating globally should protect its value through exposure containment under both privacy shield and the forthcoming GDPR.

    April 02, 2017Dan Panitz and H. Bruce Gordon
  • While cybersecurity spending at many organizations still tends to focus on perimeter defenses, security experts have begun to face the reality that it is nearly impossible to keep bad actors out of your network, and are turning their attention to better ways of mitigating threats posed by intruders once they've hacked their way in.

    April 02, 2017Jason Straight
  • While the threat of "big data" — massive amounts of data inside an organization — has cast a shadow over IT and legal departments for several years, the real challenge can oftentimes be the variety. It's why we believe the real challenge is less about "big data" and more about "new data types" — that quickly defeat traditional collection and review tools and strategies.

    April 02, 2017Tim Anderson and JR Jenkins
  • IT security professionals used to warn that only two types of businesses exist: those that have been hacked, and those that will be. Now, many are even more pessimistic, and divide the world's businesses into companies that know that they have been hacked, and those that don't. Law firms are juicy targets with all the personal identifiable information (PII) contained in client files. Intellectual property practices are especially attractive to cyber thieves because of the value of patent, trademark and trade secret information.

    April 02, 2017Sean B. Cooney