The Internet of Things is expected to lead to 50 billion connected devices by 2020 collecting and exchanging personal data about their users, their lives, their preferences and tastes. This will lead not only to relevant data...more
The federal government must publish new procedures 90 days after the 2014 Intelligence Authorization Act is signed. These procedures will become effective upon publication.
Intelligence community contractors will be...more
Self-proclaimed Internet troll and hacker Andrew “weev” Auernheimer has big plans now that he’s been sprung from prison.
We identified Auernheimer’s imprisonment and appeal as one of the top trade secret stories of...more
In this article, I delve into the views and opinions of a chief technology officer of a telecommunications company to understand important steps a company can take to combat hackers and cyber-criminals....more
As April comes to a close, it’s time once again for Verizon Enterprise Solutions’ Data Breach Investigations Report to remind us just how important data security is to the corporate world.
Released Wednesday, the report,...more
Economic crime is increasingly impacting global businesses according to a recent report from professional services firm PricewaterhouseCoopers (PwC). Globalization and growing reliance on technology and online processes are...more
Today, most of the scams reported in the news that are targeted against businesses seem to have gone high tech and usually involve illegal hacking into a company’s computer network. However, some fraud still occurs the old...more
Recently, several large retailers, including Target and Neiman Marcus, announced that hackers had compromised credit card and other personal consumer data. At Target, 40 million debt and credit cards were impacted and the...more
In light of recent, well-publicized, data security breaches at major retailers and social media company Snapchat, legislators are renewing the call for new federal laws that would strengthen data security and notification...more
This week, the U.S. Court of Appeals for the Ninth Circuit ruled that there is no cause of action for contributory cybersquatting under the Anticybersquatting Consumer Protection Act ("ACPA"), 15 U.S.C. § 1125(d). See...more
We’re not in e-Kansas anymore. And there’s no denying that present day internet Oz, while extraordinary, is increasingly scary. Cyber attacks of various types continue to escalate across the globe. As aptly stated by one...more
For a while, the legal system had a hard time catching up with technology. Though still a bit behind, many laws have been enacted prohibiting cyber offenses....more
With Cyber-Attacks on the Rise, How Can You Prepare?
The risk of a cyber-attack on a U.S. company is growing at an alarming rate. Unfortunately, cyber-attacks are not just an issue for large corporations, high tech...more
Justin Cornish is counsel in the Latham & Watkins Outsourcing and Technology Transactions Practice. He is a frequent speaker on the topic of data protection and privacy laws. With IT spending in the Middle East projected to...more
We are delighted to present you the second edition of Spotlight on Belgium, DLA Piper Belgium’s quarterly newsletter which aims to inform you about current legal developments that could affect your business.
In This Issue:
Leading the Past Week; Legislative Branch; Executive Branch; International; and Upcoming Hearings.
Excerpt from Leading the Past Week -
And the beat goes on… Another week with the White...more
On Tuesday, May 28, 2013, the Department of Justice (DOJ) announced the unsealing of an indictment against Liberty Reserve, S.A. (Liberty Reserve) in the Southern District of New York for operating a $6 billion money...more
With the occurrence of near daily threats against the nation’s critical infrastructure (CI), cybersecurity continues to be a constant concern of owners and operators of CI, Congress and the Obama Administration. Responses to...more
From a Maine nonprofit group's leak of confidential data in February, to the May 9 discovery that a worldwide gang of criminals stole $45 million by hacking into a database of prepaid debit cards, information security...more
Assuring cybersecurity has become a necessity for businesses across all industries. Cybercrime — with over $1 trillion in annual profits — is now the most lucrative illegal global business. Any business with computers and...more
Bitcoin – it sounds like a token you might use to play skeeball at a beachside arcade. It is actually a relatively new, virtual online “currency” being used for payments across the Internet. While some observers have noted...more
Back to Top