Everyone Come to Play: Exploring FOCI Mitigation Instruments
Legal Alert | Wiretap Laws in the United States
The ‘Long Arm’ of CIPA and Its Newfound Pen-Trap Claims
Episode 298 -- Electronics Communications Risks and Ephemeral Messaging
Compliant Business Communications Through Messaging Apps
Digital Issues for Individuals Working at Home (Digital Planning Podcast)
Employment Law Now IV-54- A Guest Discussion on 3 Significant Government Decisions
Discussion of PA’s Revised Uniform Fiduciary Access to Digital Assets Act
Podcast: Keeping Up with Recent Changes and Trends in Private Fund Regulation
[WEBINAR] The Public Records Act - Taming the Email Tiger
On April 8, the Office of the Comptroller of the Currency (OCC) officially notified Congress of a significant information security incident involving its email system. This notification, mandated by the Federal Information...more
Communication during a data breach is challenging in the best of circumstances, and control of information, especially early in a breach response, is critical. Below are some DOs and DON’Ts for communicating during a data...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
Let us assume a company has done all the right things. Preemptive security was a concern, so the company tightened up its written cybersecurity controls and associated technical controls, including policies and...more
Did you know Americans lost nearly $150 million dollars to real estate internet scams last year? That makes real estate cyber crime a greater risk to Americans than identity theft ($100 million in losses) or credit card fraud...more
Just when you thought the hazards of cyberfraud couldn’t get worse, the SEC recently issued a Report of Investigation (more on that later) stating that nine recent corporate victims of cyberfraud may have compounded their...more
Phishing campaigns continue to be one of the most successful ways for malicious intruders to access company information, including personal information of employees and customers. Phishing emails continue to get more and more...more
The U.S. Securities and Exchange Commission (SEC) has joined the government chorus in sounding the alarm about the rapid rise in "business email compromises" that are victimizing organizations across industry sectors....more
On October 16, 2018, the SEC issued a 21(a) report announcing that it had investigated whether certain public companies that were victims of oftentimes unsophisticated, cyber-related frauds had violated federal securities...more
On 19 April 2017, the UK Government’s Department for Culture, Media and Sport (DCMS) published a report on cybersecurity breaches and how they affected UK companies in the last year. Headline statistics from the report...more
Cat product service provider KitNipBox sued rival Meowbox in federal court in Washington alleging that Meowbox hacked into KitNipBox’s website to steal its trade secrets and confidential information and to disrupt its...more
The October blog post will be broken up into two parts. This October 15th post will comment on the TPP Agreement signed today and well as President Xi Jinping’s recent trip to the US and my impressions from Beijing, China...more