What is Bitcoin 2.0?
Will 2015 Bring New Regulations for Bitcoin Users?
Waldman: Stop Immunizing Websites That Allow Harassment
A Moment of Simple Justice - Snitching Ain't Easy
Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
In the May 2014 issue of the Business Litigation Report, we discussed a hot topic in law and technology: cloud computing. That topic did not cool down over the summer. Businesses and courts—including the Supreme Court—have...more
It seems as though every other week brings news of a new social media hack. Last week, Crayola had hackers post inappropriate content on its Facebook page, and the official Twitter feed of U.S. military's Central Command was...more
In his sixth State of the Union Address to Congress, President Obama again called on Congress to strengthen the nation’s cybersecurity laws and enact a federal standard for data security and breach notification. Speaking...more
With the global economic cost of cybercrime totaling more than $400 billion per year and breaches affecting companies ranging from retailers (e.g. Target, Walmart and Staples) and restaurants (Dairy Queen and Jimmy John’s) to...more
Turkey’s Parliament has approved Law No. 6563 on the Regulation of Electronic Commerce (Law) aimed at creating a more secure, transparent and accessible e-commerce environment. The Law is expected to come into force 1 May...more
The Organisation for Economic Cooperation and Development (OECD) released Consumer Policy Guidance on Intangible Digital Content Products (Guidance) for protecting online consumers of digital content....more
Last week, New York Attorney General Eric Schneiderman announced that he would propose a new data security law in his state that would require companies to take increased safeguards for the protection of personal information....more
The Article 29 Data Protection Working Party (Working Party) released a Working Document setting forth a co-operation procedure for issuing common opinions on “Contractual clauses” considered as compliant with the EC Model...more
The days of companies being so afraid of the reputational impact of a breach that they would look for any way possible to avoid disclosure are gone. The pendulum has swung in the opposite direction. Now companies, often in...more
Cybersecurity again looks to feature prominently on 2015’s regulatory agenda. So far this year, the Financial Industry Regulatory Authority and the SEC’s Office of Compliance Inspections and Examinations (OCIE) have announced...more
New York State Attorney General Eric Schneiderman has proposed legislation that would make the state’s data security law the strongest in the country and require “unprecedented safeguards” for personal data....more
According to the Data Quality Campaign, 36 states considered 110 student data privacy bills in 2014, and 20 states enacted 28 such bills into law. At least eight of these new laws may have significant implications for...more
In the wake of recent cyber attacks on U.S. companies, including the now famous Sony hack, President Obama has proposed new federal legislation that would presumably provide more security for confidential and private...more
Fast on the heels of President Obama’s proposal to create a national data breach notification standard, yesterday, New York Attorney General, Eric Schneiderman announced that he will propose legislation that would...more
In advance of the State of the Union address, President Obama unveiled the next steps in his plan to address recent threats by rogue hackers to public and private networks. These include a new legislative proposal to tackle...more
There was no shortage of stories about massive data breaches in 2014 and things likely won't slow down in 2015. As these stories continue to grow in number, corporate America has started to explore ways to insure against this...more
Phase 2 of Canada’s Anti-Spam Legislation (CASL) relating to the installation of computer programs will come into force on January 15, 2015. Commonly referred to as the malware prohibition, CASL goes far beyond prohibiting...more
In this presentation:
- Why cybersecurity matters
- Recently-implemented cybersecurity rules and laws
- Rapid reporting of cyber incidents and additional cybersecurity measures coming soon
Last week, the online shoe and clothing retailer Zappos.com, Inc., reached a settlement with nine state Attorneys General over a 2012 data security breach that allegedly exposed the personal information of more than 24...more
On Monday January 12, President Barack Obama announced several new proposals aimed at protecting consumer and student data in the digital age. The proposals will center on three pieces of proposed legislation, addressing...more
Although the restrictions for transfer of personal data outside of Hong Kong set out in section 33 of the Personal Data (Privacy) Ordinance (the Ordinance) are currently not yet in force, the Hong Kong Privacy Commissioner...more
The Department of Health and Human Services' (HHS) Office for Civil Rights (OCR) recently announced an agreement with a medical center to settle charges stemming from the center’s failure to prevent malware from infecting its...more
The SEC and FINRA are maintaining a steady drumbeat to motivate regulated firms to adequately protect themselves from cyberattack.
The SEC’s Office of Compliance Inspections and Examinations (OCIE) began 2014 by...more
California has long set the standard for protection of its residents’ personal information. California’s constitution explicitly recognizes a right to individual privacy and California’s legislature has been on the forefront...more
Each day, family offices receive, relay, and manage a family’s private information. Depending on the family and the role of the family office, the information managed can be voluminous and include financial information, tax...more
Find a Science, Computers & Technology Author »
Back to Top