By Aravind Swaminathan and Tara McGraw Swaminatha | The New York Times reported this week that an organized Russian criminal group stole approximately 1.2 billion user name and password credentials associated with more than 500 million email addresses... Read More
By Mercedes Kelley Tunstall, John D. Socknat and Lauren McDermott Microsoft has announced that beginning April 8, 2014, its Windows XP operating system will no longer be updated with security patches. This announcement has critical data security implications... Read More
China's new Food Safety Law (FSL) became effective on October 1, 2015. The law was passed earlier this year, in response to several high-profile food safety scandals and the need for China to harmonize with the global practice of food safety management... Read More
By Christopher S. Colby Recall from Part I of the Primer on Virginia's Data Breach Law that your laptop has been stolen, and you have concluded there has been a breach of security under Virginia's data breach law. You must now determine whom... Read More
By Peter S. Vogel “Cybercriminal gangs of the 21st century will target cloud-based applications and data repositories because that’s where the data is” as predicted in McAfee® Labs’ 2014 Threat Predictions . Cloud cyber... Read More
By Peter S. Vogel Lawyers should take advantage of Computerworld’s recent update to IT professionals about cyberinsurance which included Gartner’s definition of cyberinsurance “as protection against losses stemming from data theft... Read More
By Peter S. Vogel A brief was filed challenging a $20 million settlement that “authorizes Facebook to continue to use minors’ images for advertising without parental consent — in direct violation of the laws of seven states, including... Read More
By Peter S. Vogel Everyone should already know cyber intrusions are “when not if,” so the Federal Communications Commission (FCC) prepare a tool which “is designed for businesses that lack the resources to hire dedicated staff to... Read More
By Christopher S. Colby Imagine that your laptop is stolen. Since you conduct all your business on it, you struggle to remember the last time you backed up your data, and agonize at the prospect of rebuilding weeks, months, and possibly years of files... Read More
By Peter S. Vogel eDiscovery is the monster that ate Cleveland as everyone knows, but storing the ESI (Electronically Stored Information) is at risk to cyberintrusions since the ESI includes “highly sensitive information” as reported by... Read More
By Peter S. Vogel In a recent speech SEC Chair Mary Jo White declared that while “cybersecurity attacks cannot be entirely eliminated, it is incumbent upon private fund advisers to employ robust, state-of-the-art plans to prevent, detect, and... Read More
Privacy law in Canada continues to grapple with that delicate balance between individual privacy and freedom of expression. The recent case Chandra v. CBC provides an interesting commentary on the quickly changing world of privacy law [subscribers can... Read More
By Peter S. Vogel It is imperative that General Counsel learn IT technology and lingo- and that IT legal jargon given a recent survey identified that in almost 450 companies 31% rely on IT and 21% rely on General Counsel to be primarily responsible... Read More
By Peter S. Vogel | An international coalition of more than 300 human rights, privacy organizations, and privacy leaders established policies “that governments must follow to protect human rights in an age of digital surveillance” which... Read More
By Gerard G. Pecht , Peter A. Stokes , Mark Thomas Oakes , Utsav Mathur and Geraldine W. Young In the days leading up to its August 2014 recess, the U.S. House of Representatives passed a number of bills aimed at strengthening cybersecurity. Those... Read More