Home All Tags Data Security
  • Got a Data Breach? Call a Cyber Lawyer First!

    By Richard J. Bortnick of Traub Lieberman Straus & Shrewsberry LLP Data breaches don’t care about how mighty your organization is. Whether your company is Fortune 500®, middle-market or even a mom and pop, you’re at risk of a breach. It doesn’t matter whether the intrusion...
  • Do You Need the Government to Tell You How to be Ethical with Big Data?

    By Kristin Casler, featuring Tim Keller of Lindquist & Vennum LLP and Robert Carver of Brandeis International Business School Regulators from all walks of government are anxious to exert some control over data use and privacy. While companies wait for guidance or restrictions, experts agree...
  • From Snowstorms to Hurricanes to Earthquakes: Best Practices for Readiness

    By Kristin Casler Featuring Joseph D. Jean of Pillsbury Winthrop Shaw Pittman LLP and Jennifer A. Kearns of Duane Morris LLP. When a long, cold winter ends, it can be easy to relax and enjoy the warm breezes of spring. Snap out of it! Tornadoes are already ripping through the Midwest. Is your...
  • Are hackers after your M&A info? Before you answer, read on

    We all know that people with inside information can time their investment decisions to make millions in the stock market, then perhaps enjoy whopping fines and prison time. But what if you can get inside information without the insider’s knowledge? It looks like a group of hackers is doing...
  • Corporate Crisis Failures: A Crisis Communications Veteran Shares Lessons Learned from 2014

    By MELANIE DOUGHERTY THOMAS, Managing Director, INFORM--- No company wants to find itself managing a crisis, but many organizations find themselves in that mode every day. Recent examples have ranged from massive data breaches and cyberattacks—most notably the Sony® hack - to product...
  • Lured in by cutting-edge technology? Learn before you leap

    Edited by Kristin Casler featuring insights from DAVID LINGENFELTER Information Security Officer at Fiberlink, an IBM Company, maker of MaaS360 software-- As companies embrace new technologies, they can’t help but think about the associated security risks. News of the latest company to...
  • When the Bills Come Due, Who is Liable for Credit Card Cyber Theft?

    PCI compl iance. In these times of rampant credit card fraud, few other words cause such angst for merchants and their counsel. The key to improving your outcome is to understand what is required to prevent a security breach, what is required when one occurs, and what steps can be taken to mitigate penalties...
  • New Risks Posed by the “Internet of Things"

    The Internet of Things, or “IoT” as it is now called, is here. It must be; it has a Wikipedia page . It’s growing and evolving, and it’s supposed to change our lives in ways we can’t imagine. It’s the newest hot topic in the tech world. So what is the Internet of Things...
  • When Hackers Attack: Mitigating the Existential Data Breach Risk

    Retail businesses look forward to the holiday season as the pinnacle of their annual sales, with a strong finish spelling success for the coming year. With millions of transactions processing per day, the holidays present a ripe opportunity for hackers to breach corporate systems and steal valuable customer...
  • Regulatory Change and Increased Governmental Scrutiny Top the Risks that Concern Corporate Leadership, Survey Reveals

    Understanding your company’s business risks and the concerns of corporate leadership is an important requirement for any in-house counsel to advise and direct their organization. With that in mind, if you’re like the 370 board members and C-suite executives surveyed recently by the business...
  • Cyber Darkness: Energy Sector Security Challenges

    By Brian Finch & Tom Kellermann Editor’s Note: Brian Finch is a partner with Dickstein Shapiro LLP and Tom Kellermann is a managing director with Alvarez & Marsal Holdings, LLC. Thanks to Mr. Finch and Mr. Kellermann for allowing us to publish their insightful article. The year 2014...
  • Mitigating the Existential Data Breach—Best (and Ethical) Practices | A LexisNexis® OnDemand Webinar

    Recording Date: Wednesday, March 12, 2014 | Duration: 95 minutes | VIEW NOW | By all accounts, corporate data security risks are only getting more frequent and more severe. New technologies and practices—cloud computing, mobile devices, big data analytics, global outsourcing and BYOD—give...
  • New Cyber Guidance on the Horizon—Be Prepared

    BY ART EHUAN, ALVAREZ & MARSAL and LISA J. SOTTO, HUNTON & WILLIAMS LLP -- In February 2013, following the failure of legislative initiatives and in response to increasingly sophisticated and ever-growing cyber threats directed at businesses and government agencies from hackers, hacktivists...
  • Payment Card Industry Regulations: Unknown and Misunderstood Risks of Non-Compliance Abound

    Fines and penalties may be in the thousands of dollars, but assessments of the funds banks and credit card companies lose due to breaches and fraud can be in the millions―enough to put smaller merchants out of business entirely. Worse yet is that most merchants do not even read―let alone understand―the...
  • Attorney-Client Privilege in the Age of Digital Leaks, Peeks and Breaches

    PAULA SCHAEFER, ASSOCIATE PROFESSOR, UNIVERSITY OF TENNESSEE COLLEGE OF LAW -- Massive. The word almost seems inadequate. Maybe colossal or astronomical would be better. Anyway, “a lot” of data has been gathered, breached, lost and leaked in recent months at a rate, it’s safe...
  • Third Party Due Diligence | A LexisNexis® OnDemand Webinar

    Recording Date: Thursday, July 25, 2013 | Duration: 95 minutes | VIEW NOW | Today’s news is filled with stories describing disastrous, costly and often painfully public consequences of some unfortunate company’s data breach. Breaches such as these are often a consequence of a third...