After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Much has been written about the New York Supreme Court’s landmark ruling in Zurich American Insurance Co. v. Sony Corp., Index. No. 651982/2011 (N.Y. Supr. Ct. Feb. 21, 2014), in which a New York trial court denied coverage...more
In This Issue:
- NIST Announces October Workshop and Releases Framewok Update
- Insurance Company Succeeds in Cybersecurity Litigation
- Safe Harbor Under Attack — This Time From a US Group
Cyber liability is a clear and present danger. Target Corp. recently reported at least $235 million as gross expenses related to its 2013 data breach. Fortunately, Target was able to recover $90 million of that loss under...more
A recent article in August’s Best’s Review, The Rise of the Super Models, by Kate Smith (not Kate Upton, sorry), caught our eye. A lot is going on in the world of computer catastrophe modeling. First, demand by insurers and...more
As implied by the name, the commercial general liability (CGL) insurance policy provides businesses with coverage for a wide array of claims by third parties, including claims for damage to “tangible property” and claims...more
The prevalence of cyber data breach over the years has not only grown in number, but has also grown in size. Perhaps the most well-known example of a large-scale data breach is that suffered by Target Corp. occurring at the...more
The Recent Increase In Focus on Privacy Issues -
Privacy issues have been the focus of many state efforts over the past few years. However, the SEC has increased their focus tremendously over the past few months (see...more
On August 6, 2014, the New York Times – and other media outlets – reported that a Russian crime ring had amassed the largest known collection of stolen Internet data – a cache of at least 1.2 billion user name and password...more
The insurance industry continues to respond to the growing threat of data breaches by directing businesses facing that risk towards new, risk-specific cyber insurance products, while attempting to restrict coverage for data...more
State and Federal Regulations Pertaining to Autonomous Vehicles -
While autonomous vehicles (AVs) are not yet a regular fixture on the nation’s roadways, policymakers, legislators and regulators have started to...more
Your network is your company’s life blood. You want to be protected in the event your cybersecurity is breached; the attack on Target being a recent, well-publicized reminder to the threat of cyber attacks. ...more
No business is immune to data breach. Digital data in particular can be lost in innumerable ways, causing serious business interruptions and consumer injuries. After falling victim to a hack, virus, or cyber theft, companies...more
In This Issue:
- New Studies Highlight Privacy and Cybersecurity Risks and Costs
- SEC Commissioner Addresses the Role of the Board on Cybersecurity Matters
- Supreme Court Decision on Cellphone Searches...more
Encryption Flaw "Heartbleed" Creates Data Risk: How Insurance Can Stanch the Bleeding -
In early April, news broke of an encryption flaw named “Heartbleed” that exposed companies to data breaches for over two and one...more
The recent onslaught of cybersecurity incidents and payment card thefts dominate daily headlines and have captured the nation’s attention—from the diner whose credit card was compromised during a data breach to the President...more
On March 25, 2014, in State Farm Mutual Automobile Insurance Company v. Mobile Diagnostic Imaging, Inc., the U.S. District Court for the District of Minnesota held that a corporation not owned or controlled by physicians does...more
The use of third party technology service providers has become widespread and commonplace in all industries. Technology services like “cloud” data storage providers and software as a service (SaaS) allow companies of all...more
Cyber is still a relatively young risk and the various stakeholders in cyber-risk are at times, still trying to determine their particular role. This includes the officers and/or directors of companies for establishing...more
According to FBI Director Robert Mueller, "there are only two types of companies: those that have been hacked and those that will be…." Computer hackers stealing our personal information (social security numbers, bank...more
Recent examples of data breaches resulting in invasion of privacy lawsuits abound. Target and other retailers, financial services companies and other businesses have had their internal data systems breached and consumers’...more
After months of shocking reports of cyber breaches and data thefts at some of the largest retailers and the scramble of companies in just about every line of business to adjust to the new normal of cyber risk, we recently had...more
As the number of data breaches and disclosure of personally identifiable information (“PII”) increases, courts are being asked to decide whether such claims for data breach and disclosure of PII are covered by traditional...more
Following up on last week’s post, we return to the wide range of questions about a company’s operations that can guide a team building a data breach response plan to cover many of the risks encountered in the wake of a...more
The insurance sector is highly regulated and also outsourcing agreements in this sector are victim of such regulatory framework with stringent obligations in terms of contents of agreement, internal procedures and formalities...more
It is likely that your company has an obligation to protect the data and the financial information of its customers, clients and/or employees. This may be harder than ever since much of the company’s most of the valuable...more
Find a Science, Computers & Technology Author »
Back to Top