Home
–
All Tags
–
Data Security
Affordable Care Act
Attorney Client Privilege
Big Data
Cloud Computing
Compliance
Crisis Communication
C-Suite
Cyber breach
Cybersecurity
DOC
Due Diligence
Emerging Issues
Employment
Energy
Governance
Hi-Tech
IoT
Mergers & Acquisitions
Personal Data
Privacy
Regulatory
spearfishing
Technology
Vendor Management
Got a Data Breach? Call a Cyber Lawyer First!
By Richard J. Bortnick of Traub Lieberman Straus & Shrewsberry LLP Data breaches don’t care about how mighty your organization is. Whether your company is Fortune 500®, middle-market or even a mom and pop, you’re at risk of a breach. It doesn’t matter whether the intrusion...
on
1 Jul 2015
Do You Need the Government to Tell You How to be Ethical with Big Data?
By Kristin Casler, featuring Tim Keller of Lindquist & Vennum LLP and Robert Carver of Brandeis International Business School Regulators from all walks of government are anxious to exert some control over data use and privacy. While companies wait for guidance or restrictions, experts agree...
on
1 Jul 2015
From Snowstorms to Hurricanes to Earthquakes: Best Practices for Readiness
By Kristin Casler Featuring Joseph D. Jean of Pillsbury Winthrop Shaw Pittman LLP and Jennifer A. Kearns of Duane Morris LLP. When a long, cold winter ends, it can be easy to relax and enjoy the warm breezes of spring. Snap out of it! Tornadoes are already ripping through the Midwest. Is your...
on
27 Apr 2015
Are hackers after your M&A info? Before you answer, read on
We all know that people with inside information can time their investment decisions to make millions in the stock market, then perhaps enjoy whopping fines and prison time. But what if you can get inside information without the insider’s knowledge? It looks like a group of hackers is doing...
on
8 Jan 2015
Corporate Crisis Failures: A Crisis Communications Veteran Shares Lessons Learned from 2014
By MELANIE DOUGHERTY THOMAS, Managing Director, INFORM--- No company wants to find itself managing a crisis, but many organizations find themselves in that mode every day. Recent examples have ranged from massive data breaches and cyberattacks—most notably the Sony® hack - to product...
on
8 Jan 2015
Lured in by cutting-edge technology? Learn before you leap
Edited by Kristin Casler featuring insights from DAVID LINGENFELTER Information Security Officer at Fiberlink, an IBM Company, maker of MaaS360 software-- As companies embrace new technologies, they can’t help but think about the associated security risks. News of the latest company to...
on
8 Jan 2015
When the Bills Come Due, Who is Liable for Credit Card Cyber Theft?
PCI compl iance. In these times of rampant credit card fraud, few other words cause such angst for merchants and their counsel. The key to improving your outcome is to understand what is required to prevent a security breach, what is required when one occurs, and what steps can be taken to mitigate penalties...
on
2 Sep 2014
New Risks Posed by the “Internet of Things"
The Internet of Things, or “IoT” as it is now called, is here. It must be; it has a Wikipedia page . It’s growing and evolving, and it’s supposed to change our lives in ways we can’t imagine. It’s the newest hot topic in the tech world. So what is the Internet of Things...
on
10 Jun 2014
When Hackers Attack: Mitigating the Existential Data Breach Risk
Retail businesses look forward to the holiday season as the pinnacle of their annual sales, with a strong finish spelling success for the coming year. With millions of transactions processing per day, the holidays present a ripe opportunity for hackers to breach corporate systems and steal valuable customer...
on
10 Jun 2014
Regulatory Change and Increased Governmental Scrutiny Top the Risks that Concern Corporate Leadership, Survey Reveals
Understanding your company’s business risks and the concerns of corporate leadership is an important requirement for any in-house counsel to advise and direct their organization. With that in mind, if you’re like the 370 board members and C-suite executives surveyed recently by the business...
on
17 Mar 2014
Cyber Darkness: Energy Sector Security Challenges
By Brian Finch & Tom Kellermann Editor’s Note: Brian Finch is a partner with Dickstein Shapiro LLP and Tom Kellermann is a managing director with Alvarez & Marsal Holdings, LLC. Thanks to Mr. Finch and Mr. Kellermann for allowing us to publish their insightful article. The year 2014...
on
17 Mar 2014
Mitigating the Existential Data Breach—Best (and Ethical) Practices | A LexisNexis® OnDemand Webinar
Recording Date: Wednesday, March 12, 2014 | Duration: 95 minutes | VIEW NOW | By all accounts, corporate data security risks are only getting more frequent and more severe. New technologies and practices—cloud computing, mobile devices, big data analytics, global outsourcing and BYOD—give...
on
18 Feb 2014
New Cyber Guidance on the Horizon—Be Prepared
BY ART EHUAN, ALVAREZ & MARSAL and LISA J. SOTTO, HUNTON & WILLIAMS LLP -- In February 2013, following the failure of legislative initiatives and in response to increasingly sophisticated and ever-growing cyber threats directed at businesses and government agencies from hackers, hacktivists...
on
3 Nov 2013
Payment Card Industry Regulations: Unknown and Misunderstood Risks of Non-Compliance Abound
Fines and penalties may be in the thousands of dollars, but assessments of the funds banks and credit card companies lose due to breaches and fraud can be in the millions―enough to put smaller merchants out of business entirely. Worse yet is that most merchants do not even read―let alone understand―the...
on
3 Nov 2013
Attorney-Client Privilege in the Age of Digital Leaks, Peeks and Breaches
PAULA SCHAEFER, ASSOCIATE PROFESSOR, UNIVERSITY OF TENNESSEE COLLEGE OF LAW -- Massive. The word almost seems inadequate. Maybe colossal or astronomical would be better. Anyway, “a lot” of data has been gathered, breached, lost and leaked in recent months at a rate, it’s safe...
on
2 Sep 2013
Third Party Due Diligence | A LexisNexis® OnDemand Webinar
Recording Date: Thursday, July 25, 2013 | Duration: 95 minutes | VIEW NOW | Today’s news is filled with stories describing disastrous, costly and often painfully public consequences of some unfortunate company’s data breach. Breaches such as these are often a consequence of a third...
on
16 Jul 2013