News & Analysis as of

Corporate Counsel Young Lawyers Hackers

Snell & Wilmer

Snell & Wilmer Rolls Out Interactive Data Breach Map

Snell & Wilmer on

Snell & Wilmer’s Breach Response Team regularly guides clients through all phases of data breach and cyber incident response, including leading internal investigations related to data breaches and cyber incidents in...more

Fish & Richardson

The CFAA: Shield or Anti-Competitive Sword in the World of Data Scraping?

Fish & Richardson on

Most people think of the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030, as the federal criminal statute addressing computer hacking and other cybercrime. But as more and more businesses vest their enterprise value in...more

Ballard Spahr LLP

Ponemon Institute Study on Costs of Data Breaches Highlights Improvement and New Risks for U.S. and Global Companies

Ballard Spahr LLP on

The average cost of a data breach, on both an aggregate and a per-record basis, has decreased slightly according to the Ponemon Institute's 2017 Cost of Data Breach Study: Global Overview. In addition to presenting recent...more

Orrick, Herrington & Sutcliffe LLP

No Harm, But Foul? FTC Sues Internet of Things Maker D-Link for Security “Vulnerabilities” Despite No Allegations of Breach

Shortly after the new year, the Federal Trade Commission filed suit in the Northern District of California against D-Link Corporation, a Taiwan-based maker of wireless routers, Internet Protocol (IP) cameras, and software...more

Fish & Richardson

Short-Sellers Partnering with Hackers: Exploiting Cybersecurity Fears for Short-Term Profit

Fish & Richardson on

A research report released last week on the supposed cyber vulnerabilities of St. Jude Medical’s devices not only jeopardizes a pending $25 billion acquisition of the company by Abbott Laboratories, it opens a worrisome new...more

K&L Gates LLP

Hold On, You Didn’t Overpay for That: Courts Address New “Overpayment” Theory from Plaintiffs in Data Breach Cases

K&L Gates LLP on

With the ever-increasing amount of personal information stored online, it is unsurprising that data breach litigation has become increasingly common. A critical issue in nearly all data breach litigation is whether a...more

Skadden, Arps, Slate, Meagher & Flom LLP

"Privacy & Cybersecurity Update - June 2016"

In this edition of our Privacy & Cybersecurity Update, we examine the impact of Brexit on EU data protection, court rulings on cyber insurance policy exclusions and coverage gaps, recent statements from the FTC and the...more

Bennett Jones LLP

Cyber-Security and the Rise of the Vigilante Hacker - Can illegally obtained data be used in a civil proceeding?

Bennett Jones LLP on

In the world of cyber hacks and leaks, there are two general categories of players: the fraudsters who steal data in order to obtain a profit, and the “hacktivists” who expose data, purportedly for the greater good....more

Pillsbury - Internet & Social Media Law Blog

From Ashley Madison to the Panama Papers: Is Hacked Data Fair Game?

We’ve previously written about the distinctions between hacking credit and other financial data in comparison to hacking private information. (See Ashley Madison and Coming to “Terms” with Data Protection.) The issue of how...more

Alston & Bird

Class Action Roundup: Winter 2016

Alston & Bird on

Where the (Class) Action Is - This issue of Roundup wraps up 2015 with another slate of interesting cases spanning industries and subject matter. The running theme of ascertainability is now stretching into antitrust...more

Patterson Belknap Webb & Tyler LLP

The Evolving Landscape of “Hacking Back” Against Cyber Attacks

Self-defense is a natural, almost reflexive human instinct. But it has a complicated history in American law, full of contradiction and compromise. Many jurisdictions have long recognized that an otherwise illegal act—such...more

JD Supra Perspectives

Hacking Your Health: For Healthcare Providers, Risk Analysis Must Be Ongoing

JD Supra Perspectives on

Healthcare providers would be wise to keep in mind that if a patient is harmed by a hacked medical device, Exhibit A in the negligence suit against them may be that provider’s risk analysis, or lack thereof....more

Carlton Fields

A Firewall for the Boardroom: Best Practices to Insulate Directors and Officers From Derivative Lawsuits and Related Regulatory...

Carlton Fields on

Shortly after the massive 2013 Target data breach, shareholders filed four derivative lawsuits against the company’s directors and some of its officers (13 CARE 624, 3/20/15). The shareholders alleged that the defendants had...more

Carlton Fields

Cybersecurity Coverage Litigation: Learning to Survive After the Second Wave Hits

Carlton Fields on

It’s a familiar pattern. First, new risks inspire legislation and regulations that impose new penalties. Next, insurers and policyholders fight over whether the new liabilities are covered under traditional liability...more

McDermott Will & Emery

Should We Hack Back?

“No,” says U.S. Assistant Attorney General Leslie R. Caldwell. At the most recent Cybersecurity Law Institute held at Georgetown University Law Center in late May, the head of the U.S. Department of Justice’s (DOJ) Criminal...more

BakerHostetler

A Deeper Dive: Risk Assessments Are a Necessary Step in Creating Layered Cyber Defenses

BakerHostetler on

Tens of thousands of cyber attackers employed by Chinese People’s Liberation Army and other employees and contractors of the Chinese Ministry of State Security work diligently every day to steal information from U.S....more

16 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide