News & Analysis as of

Hackers Electronically Stored Information

EDRM - Electronic Discovery Reference Model

OpenAI Generates a ‘Hired Gun Hacker’ Defense to the N.Y. Times Copyright Case

Most everyone in the AI and legal worlds by now knows about the New York Times (“NYT”) suit against Microsoft and various Open AI entities (“OAI”). The NYT alleges copyright infringement by the practice of OAI, and most all...more

EDRM - Electronic Discovery Reference Model

DefCon Chronicles: Hackers Respond to President Biden’s Unprecedented Request to Come to DefCon to Hack the World for Fun and...

Hackers responded to the White House call by the thousands, including reporter-AI-hacker Ralph Losey, to try to break existing software in open contests. Ralph joined in the AI hack attack, but there were many other...more

TransPerfect Legal

Changing the Automotive Narrative: Hacking Concerns & Wireless Communication Interfaces

TransPerfect Legal on

The automotive industry has been a tight-knit and exclusive club since the 1950s automobile boom. After months of distress caused by semiconductor chip shortages, assembly plant shutdowns, and higher prices, is that still the...more

Robinson+Cole Data Privacy + Security Insider

Broward Health Data Breach Affects 1.3 Million Individuals

On January 1, 2022, Broward Health, which operates dozens of health care facilities in Broward County, Florida, notified over 1.3 million individuals that a threat actor gained access to and removed data from its system on...more

Bilzin Sumberg

Twitter Wins Dismissal of Defamation Suit in Florida Federal Court

Bilzin Sumberg on

A Florida federal court recently dismissed a defamation lawsuit brought against social media giant Twitter in a case related to documents allegedly obtained from President Biden’s son Hunter’s laptop.1  The plaintiff, John...more

Reveal

Be Aware, Be Very Aware – of Cybersecurity Awareness Month!

Reveal on

Tomorrow is October 1st, and the end of the month is Halloween. So, the phrase “be afraid, be very afraid” (a tagline* which came from the 1986 movie The Fly) seems very appropriate for the end of October. But the phrase “be...more

Reveal

Healthcare Organizations Must Deal with their Shadow Information Problem

Reveal on

A myopic focus on protecting EMR (Electronic Medical Records) systems has left healthcare organizations open to shadow information risk. In a world where hackers and ransomware criminals are regularly compromising healthcare...more

Reveal

Hackers Will Not Only Take Your Money, They Could Also Take Your Patients’ Lives

Reveal on

Go to just about any news site today and there is probably a new story about a data breach that costs a company millions of dollars. Just in the past few weeks, we’ve seen Colonial Pipeline pay as much as $5 million in...more

Association of Certified E-Discovery...

[Webinar] Risky Business – Protecting Your Data From Hackers? - April 21st, 11:30 am - 1:00 pm CDT

It’s hard to read the news these days without hearing about another major breach. No one is immune to these attacks including government, social media, law firms, dating websites, credit reporting agencies, and even our...more

Association of Certified E-Discovery...

Defining Doxing And Learning How to Avoid It

From August 2015 to August 2017, a man named Rodney Phipps was sentenced to prison for making fake phone calls to emergency services—calls that would end up sending SWAT and police to strangers’ residences in practice known...more

Lighthouse

Does Cellular 5G Equal 5x the Fraud and Misconduct Risk?

Lighthouse on

Increased cellular speed through mobile devices offer increased opportunity for fraudsters to circumvent corporate IT controls by using shadow IT platforms to infiltrate proprietary and confidential data at scale, wreak havoc...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - Issue 4, August 2020

Crosmun v. The Trustees of Fayetteville Technical Community College Provides Much Needed Guidance to NC Courts on How to Properly Craft eDiscovery Protocols - The Court of Appeals decision in Crosmun is important because...more

Epiq

Yes, Blockchain Can Be Hacked Too

Epiq on

Many different organizations, including those in the legal industry, use blockchain for several business functions. Blockchain allows users to record transactions over a distributed network of computers. The server is secure...more

Patterson Belknap Webb & Tyler LLP

NY Appellate Court Slams “Egregious Litigation Misconduct” and “Improperly Accessed” Email Communications

When we hear about discovery abuses in litigation, we often think of overzealous lawyers using obstructionist tactics. Such behavior, however, rarely involves litigants “improperly accessing” the email communications of an...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - June 2018 #4

Robinson & Cole LLP on

Just weeks after Mexico’s central bank was targeted by hackers who stole $15 million, Chile’s biggest bank, Banco de Chile, announced on May 28, 2018, that it had been struck by a “virus” that affected its workstations,...more

Hogan Lovells

Disrupting the law

Hogan Lovells on

As developing countries continue to gain access to technology and begin to innovate existing systems, it is has become clear that technology has stopped being an end in itself but an instrumental tool and means to accelerate...more

Association of Certified E-Discovery...

Bold Thinking, Not Tinkering - What is the Hackathon's purpose?

The Hackathon brings together multiple streams of entrepreneurial activity (internationally) and taps into a global community of individuals and organizations with a passion for innovation via legal technology. Given that it...more

Epiq

Five Buzzworthy eDiscovery Trends Overheard at LegalTech 2018

Epiq on

Every year, the legal technology community gathers at the New York Hilton Midtown to see what’s new in the industry, catch up with colleagues, and visit with old friends. For those of us who’ve been in the industry for 10+...more

Fisher Phillips

Is Your Company Car Exposing Sensitive Data To Hackers?

Fisher Phillips on

In today’s world, where lots of sensitive data are stored electronically, prudent companies utilize sophisticated computer cyber security systems to prevent the hacking of such data. They likely also require employees to...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - October 2017 #3

Robinson & Cole LLP on

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more

Stinson - Corporate & Securities Law Blog

SEC Chair Clayton’s Statement on Cybersecurity: EDGAR was Hacked

SEC Chairman Jay Clayton today issued an unusual statement highlighting the importance of cybersecurity to the agency and market participants, and detailing the agency’s approach to cybersecurity as an organization and as a...more

Robins Kaplan LLP

Your Daily Dose of Financial News

Robins Kaplan LLP on

As expected, the Fed left interest rates at current levels yesterday, though it hinted at another December rate hike and officially unveiled the start of its bond wind-down next month....more

Farrell Fritz, P.C.

Surreptitious Cyber-Conduct Results In New York County Decision Striking Defendant’s Answer

Farrell Fritz, P.C. on

In a decision dated May 26, 2017, Justice Chan of the Supreme Court of the State of New York, New York County, struck the defendant’s answer. Although the Court acknowledged that the imposition of this particular sanction...more

Robinson+Cole Data Privacy + Security Insider

Employer Has No Legal Duty To Protect Employee Electronic Information

A court in Pennsylvania recently held that an employer does not have a legal duty to act reasonably in managing its computer systems to safeguard sensitive personal information collected from its employees, when the employer...more

Cadwalader, Wickersham & Taft LLP

Law Firm Data Breaches Demonstrate the Expanding Scope of Cyber Attacks

In a case of “cyber meets securities fraud,” the United States Attorney’s Office for the Southern District of New York (“SDNY”) recently indicted three foreign nationals on charges of insider trading, wire fraud, and computer...more

33 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide