News & Analysis as of

Internet of Things and Cybercrime – what risks?

The Internet of Things is expected to lead to 50 billion connected devices by 2020 collecting and exchanging personal data about their users, their lives, their preferences and tastes. This will lead not only to relevant data...more

2014 Intelligence Authorization Act Imposes Cyber Breach Reporting Requirement on Intelligence Community Contractors - Many...

The federal government must publish new procedures 90 days after the 2014 Intelligence Authorization Act is signed. These procedures will become effective upon publication. Intelligence community contractors will be...more

A CTO’s Views On How To Combat Hackers & Cybercriminals

In this article, I delve into the views and opinions of a chief technology officer of a telecommunications company to understand important steps a company can take to combat hackers and cyber-criminals....more

Verizon’s Data Breach Report Reveals The Nine Most Pressing Corporate Security Threats

As April comes to a close, it’s time once again for Verizon Enterprise Solutions’ Data Breach Investigations Report to remind us just how important data security is to the corporate world. Released Wednesday, the report,...more

Avoiding a Business Scam

Today, most of the scams reported in the news that are targeted against businesses seem to have gone high tech and usually involve illegal hacking into a company’s computer network. However, some fraud still occurs the old...more

High Profile Security Breaches Spur Congressional Action

Recently, several large retailers, including Target and Neiman Marcus, announced that hackers had compromised credit card and other personal consumer data. At Target, 40 million debt and credit cards were impacted and the...more

Renewed Congressional Interest in Federal Data Security and Breach Notification Legislation

In light of recent, well-publicized, data security breaches at major retailers and social media company Snapchat, legislators are renewing the call for new federal laws that would strengthen data security and notification...more

Cyber Law Tracker: Cybersquatting Ruling in the Ninth Circuit

This week, the U.S. Court of Appeals for the Ninth Circuit ruled that there is no cause of action for contributory cybersquatting under the Anticybersquatting Consumer Protection Act ("ACPA"), 15 U.S.C. § 1125(d). See...more

Data Protection and Privacy Laws in the Middle East

Justin Cornish is counsel in the Latham & Watkins Outsourcing and Technology Transactions Practice. He is a frequent speaker on the topic of data protection and privacy laws. With IT spending in the Middle East projected to...more

Spotlight On Belgium: Trends in the Legal Landscape - Issue 2, 2013

We are delighted to present you the second edition of Spotlight on Belgium, DLA Piper Belgium’s quarterly newsletter which aims to inform you about current legal developments that could affect your business. As the...more

Federal Government Expands AML Cybercrime Enforcement

On Tuesday, May 28, 2013, the Department of Justice (DOJ) announced the unsealing of an indictment against Liberty Reserve, S.A. (Liberty Reserve) in the Southern District of New York for operating a $6 billion money...more

Cyber Outlook: Executive Order Implementation, Congressional Action & Regulatory Requirements and Enforcement

With the occurrence of near daily threats against the nation’s critical infrastructure (CI), cybersecurity continues to be a constant concern of owners and operators of CI, Congress and the Obama Administration. Responses to...more

Cybersecurity Experts Urge Diligence at Portland Conference

From a Maine nonprofit group's leak of confidential data in February, to the May 9 discovery that a worldwide gang of criminals stole $45 million by hacking into a database of prepaid debit cards, information security...more

Enterprise Data Security For The Securities Lawyer

Assuring cybersecurity has become a necessity for businesses across all industries. Cybercrime — with over $1 trillion in annual profits — is now the most lucrative illegal global business. Any business with computers and...more

Bitcoins: Online Currency’s Uncharted Frontier

Bitcoin – it sounds like a token you might use to play skeeball at a beachside arcade. It is actually a relatively new, virtual online “currency” being used for payments across the Internet. While some observers have noted...more

15 Results
|
View per page
Page: of 1