Account

Sign in to access your account and subscription

Technology Media and Telecom

  • High profile cyberattacks and data breaches have become routine occurrences. Cyber threats are so pervasive that many privacy and security experts advise that responsible parties ' like fiduciaries of employee benefit plans ' should prepare for when a data breach occurs, not if. Data collected by employee benefit plans includes sensitive information that makes them a particularly attractive target for cybercrime.

    September 01, 2016Marc Bussone
  • At a recent CIO panel, an audience member asked the three of us on stage: "What do you see as your number one priority in the coming 12 months?" I responded "cybersecurity" without hesitation. The panelist that followed said that cybersecurity was a priority, but that it is a subset of risk management. This was not the first time I have heard the chief information pro and/or technologist in a large company make that point, and I have to respectfully disagree.

    September 01, 2016Justin Hectus
  • Although attorneys are rapidly becoming familiar with structuring digital data requests and responding to those requests in a way that is thorough, but reasonable, most attorneys feel at sea in the e-discovery ethics arena.

    September 01, 2016Jonathan Bick
  • A Collection of Moves in the Cybersecurity and Privacy Practice Areas

    September 01, 2016
  • Every generation has its own new fads, which can sweep across the country, if not the world, seemingly from nowhere, capturing the imagination and attention of millions. With the exception of a few fads, these activities, however brilliant or mindless, do not create legal issues and potential litigation involving those who participate. Pok'mon Go is one of those exceptions.

    September 01, 2016Robert D. Lang
  • ALM's cyberSecure conference takes place Sept. 27-28 in New York. ALM cyberSecure is designed to provide business executives with the necessary tools to build and deploy a successful adaptive cybersecurity plan that comprehensively addresses detection, defense and response.

    August 31, 2016
  • Especially in a time where cybersecurity remains in the headlines on a regular basis, it's crucial to understand what data exists in order to protect it. Where's your data? What if you lost track of some of it? What if attackers copied it?

    August 01, 2016Bill Lederer
  • Have you heard? Social media is mainstream ' 70% of the U.S.are using social media and more than 50% of them are over the age of 35 (that's right ' it's not just millennials). But did you know that in-house counsel are active social media participants? In fact, their usage is growing and today nearly two-thirds of general counsel (GCs) are engaging at least weekly in social media for professional reasons.

    August 01, 2016Adrian Dayton and Jeff Litvack
  • Your favorite internal client has just messaged you about a new contract that needs a rush review. The counterparty is reportedly one of the hottest new "fintech" companies in Silicon Valley. You are the master of all things vendor contract-related in your shop, but perhaps this is the first fintech contract to cross your desk. This article addresses some of the special issues that might be presented by this sort of contract.

    August 01, 2016Bryan G. Handlos and Kevin F. Griffith