Legal Alert | Wiretap Laws in the United States
The ‘Long Arm’ of CIPA and Its Newfound Pen-Trap Claims
Episode 298 -- Electronics Communications Risks and Ephemeral Messaging
Compliant Business Communications Through Messaging Apps
Digital Issues for Individuals Working at Home (Digital Planning Podcast)
Employment Law Now IV-54- A Guest Discussion on 3 Significant Government Decisions
Discussion of PA’s Revised Uniform Fiduciary Access to Digital Assets Act
Podcast: Keeping Up with Recent Changes and Trends in Private Fund Regulation
[WEBINAR] The Public Records Act - Taming the Email Tiger
Communication during a data breach is challenging in the best of circumstances, and control of information, especially early in a breach response, is critical. Below are some DOs and DON’Ts for communicating during a data...more
SEC DROPS NEW REQUIREMENT FOR INCIDENT RESPONSE PROGRAMS, PROPOSAL FOR RIAS TO ADOPT CIP, SEC EXAMS SHARES MARKETING RULE FAILURES, RIA SLAMMED FOR FAILING TO RETAIN TEXTS, AND SEC WINS ON SHADOW TRADING THEORY - Welcome to...more
Ransomware attacks that shut business down to zero and data breaches that disclose the personal information of customers, vendors and employees justifiably strike fear in the hearts of executives everywhere. Organizations can...more
Nelson Mullins invites you to the two-day webinar, Creating a Data Privacy & Security Playbook for 2024: An Overview of Compliance and Regulations, AI, and Data Breach Concerns, on Feb. 7 and 8 in honor of Privacy Day...more
Popular file transfer tool MOVEit’s recent data security vulnerability prompted many businesses to communicate, internally and externally, about the impact of the incident on its business. Originally published in Law360 -...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
It is imperative that a company knows what data it holds, why it is holding it, where it holds it, and who has access to it. The old adage that information is power leads many to believe that holding on to as much data as...more
In our last newsletter, we analyzed the reluctance of courts to apply privilege to the work of forensic computer consultants following data breaches. Here, we address often unavailing efforts to fit communications with...more
Let us assume a company has done all the right things. Preemptive security was a concern, so the company tightened up its written cybersecurity controls and associated technical controls, including policies and...more
Alright. So, you’ve battened down the hatches of your company’s premises, to protect your employees and your information. Employees are required to create secret computer passwords they’re not to share with anyone, even...more
Just when you thought the hazards of cyberfraud couldn’t get worse, the SEC recently issued a Report of Investigation (more on that later) stating that nine recent corporate victims of cyberfraud may have compounded their...more
Phishing campaigns continue to be one of the most successful ways for malicious intruders to access company information, including personal information of employees and customers. Phishing emails continue to get more and more...more
As expected, the Fed left interest rates at current levels yesterday, though it hinted at another December rate hike and officially unveiled the start of its bond wind-down next month....more
On 19 April 2017, the UK Government’s Department for Culture, Media and Sport (DCMS) published a report on cybersecurity breaches and how they affected UK companies in the last year. Headline statistics from the report...more
The European Commission's proposed e-privacy regulation sets forth obligations on handling electronic communications and clarifies obligations for seeking consent for the use of cookies. Meant to bring the e-privacy directive...more
Fragmented markets, alternative trading systems and dark pools are increasingly a focus of discussion in the wake of repeated market outages. Interest in these venues has been intensified by the publication of Flash Boys and...more
One hot area of data privacy litigation over the past several years has been data breach class actions brought under the California Confidentiality of Medical Information Act (“CMIA”), which provides that a person may recover...more
Programming Error Leads to “Low Tech” Data Breach at Indiana Family and Social Services Administration - Although it started with a programming error, the breach itself was paper document. Apparently, a programming...more
A federal Magistrate has recommended dismissal with prejudice of all of the cardholder plaintiffs’ claims against payment processor Global Payments, Inc. in a widely-reported data breach case....more