Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
As the relationship between the American public and computers continues to evolve, the Department of Homeland Security (DHS) promotes safe and secure Internet use each October during National Cyber Security Awareness Month....more
Yesterday I blogged from the Securities Enforcement Forum 2014, Bruce Carton’s excellent one-day conference, held at the Four Seasons hotel in Washington, D.C. The posts will be fairly raw, and certainly not verbatim...more
Almost five months after federal parliamentary elections took place, the negotiators from the four political parties around the negotiating table (Flemish parties NVA, CD&V and Open VLD and Walloon party MR) reached a...more
Every day seems to bring a new story about a significant data breach. Just within the last few weeks we have learned of the following cyber attacks...
Protecting a company against data breaches requires not only measures to prevent the adverse cyber event, but also adequate insurance to minimize the financial impact should such an event occur. Unlike traditional lines of...more
Employers need to appreciate and address the fact that employees who remove their employers’ confidential information often do not appear to appreciate the risks of being caught or the potentially very serious consequences of...more
California—the first State in the Union to pass a mandatory data breach notification statute—recently amended Cal. Civil Code section 1798.82 to attempt to clarify many disclosure and notification procedures to be undertaken...more
Cybercriminals from Russia hack into a hotel chain’s computer network. Stolen credit card numbers are sold on websites. Personal information is obtained from a popular restaurant chain. Almost on a weekly basis, we hear of a...more
On September 30, 2014, California took further steps to protect the personal information of its residents by amending several sections of its breach notification and information security laws (Cal. Civ. Code §§ 1798.81.5,...more
On September 30, 2014, Gov. Edmund G. Brown signed AB 1710 into law, amending existing law to impose even stricter regulation on businesses with access to personal information about California residents. California has long...more
Another month brings another reported massive data breach. On September 8, 2014, Home Depot confirmed that its payment data systems had been breached, potentially impacting customers using payment cards at the retailer’s US...more
Continuing the trend of changes in state breach notification and related laws, Cal. A.B. 1710 amends California's breach notification, security procedures, and Social Security number (SSN) laws in the wake of significant data...more
Information security has continued to play prominently in the news as this series has evolved. Just today AT&T announced a data breach. Home Depot and Jimmy John’s, also added to the list in the past month, are still...more
This marks the second week of National Cyber Security Awareness Month, and one focused on the Secure Development of IT Products, so it seems only appropriate to discuss security and The Internet of Things and a recent panel...more
Cyber security has gained increasing attention in recent years and cyber attacks have become more sophisticated and more frequent. Cyber attacks and other data breaches can affect millions of customers...more
On Friday, October 10th, an opportunity to submit comments on a Request for Information concerning awareness and implementation of the “Framework for Improving Critical Infrastructure Cybersecurity” closes. Companies of all...more
“It is often said that there are two kinds of companies out there — those that have suffered a data breach and those that will have one,” said Latham & Watkins partner Kevin Boyle. “So it makes a lot of sense to be prepared...more
The typical data breach lawsuit and how to protect your company -
Companies can ill afford to wait until they experience a data breach to implement protective measures -
With more than 1,367 confirmed data...more
Has the standard of care for retailers handling consumer data shifted in the last 9 months? As analysts compare the recent Home Depot data breach to the data breach of the credit card processing system at Target last...more
When companies that conduct business in Delaware make their 2015 New Year’s resolutions, they should be sure to add compliance with 6 Del. Code §§50C-101 - 50C -104 ( Section 50C) and 7 Del. Code § 736 (Section 736) to their...more
Sometimes the Greatest Risk Comes from the Inside -
Cybersecurity continues to be an issue that dominates the news. Much has been made of the cyber-risk US companies face from foreign countries and outsiders. However,...more
According to public releases by Jimmy John’s (the sandwich shop franchisor) and Signature Systems (the point of sale (POS) system provider for 216 Jimmy John’s locations), malware was installed on those POS systems through...more
On September 30, 2014, California Governor, Jerry Brown, signed Assembly Bill 1710 into law, amending California’s existing personal information privacy laws. A.B. 1710 makes several changes to existing laws including...more
October is National Cyber Security Awareness Month. This is an opportunity to remind employees (and yourselves) about how to keep corporate networks and their own cyber lives secure. All month, we will post articles that...more
On September 30, 2014, California Governor Jerry Brown signed into law an expansion of current California data breach laws. The bill, AB 1710, which was introduced in the wake of several high-profile data breaches, builds on...more
Find a Science, Computers & Technology Author »
Back to Top