By Aravind Swaminathan and Tara McGraw Swaminatha | The New York Times reported this week that an organized Russian criminal group stole approximately 1.2 billion user name and password credentials associated with more than 500 million email addresses... Read More
By Peter S. Vogel It is imperative that General Counsel learn IT technology and lingo- and that IT legal jargon given a recent survey identified that in almost 450 companies 31% rely on IT and 21% rely on General Counsel to be primarily responsible... Read More
By Gerard G. Pecht , Peter A. Stokes , Mark Thomas Oakes , Utsav Mathur and Geraldine W. Young In the days leading up to its August 2014 recess, the U.S. House of Representatives passed a number of bills aimed at strengthening cybersecurity. Those... Read More
Reaching a Congressional Consensus Will Likely Require Additional Deliberation As summarized in this Alert , the congressional proposals introduced thus far take very different approaches to addressing how to protect the privacy of student data. ... Read More
By Tara McGraw Swaminatha Your company is in crisis mode in the throes of a security incident response (IR). But you are calmly executing your well-honed IR plan − a plan you developed and tested during mock exercises over the past year. You... Read More
By Peter S. Vogel A Hong Kong Judge disagreed with Google that Google’s Autocomplete may have created libeleous content and “cited Europe’s recent ‘right to be forgotten’ ruling requiring Google to remove embarrassing... Read More
By Michael Malloy and Pavel Arievich Russia’s much publicized changes to its data protection rules come into force as of September 1, 2015. These changes are broadly, and vaguely, written and apply to almost anyone handling the personal data... Read More
By William A. Ruskin Articles concerning cyber-security and data breach typically fall into two general categories: those discussing how to prevent a data breach from occurring and those discussing how to respond when one occurs. As I discussed in... Read More
By Peter S. Vogel A recent report estimates that the ”cost of cybercrime includes the effect of hundreds of millions of people having their personal information stolen—incidents in the last year include more than 40 million people in the... Read More
By Peter S. Vogel According to the 2015 Threat Report about MaaS is that the “ average price for exploit kits is usually between $800- $1,500 a month, depending on the features and add-ons” and the “price is likely to remain low due... Read More
by Siran S. Faulders , Steve D. Rosenthal and C. Reade Jacob, Jr. On July 7, 47 state attorneys general signed onto a multistate letter to the U.S. Congress emphasizing the importance of maintaining states’ authority to enforce data breach and... Read More
By Peter S. Vogel On the heels of the recent report that cybercrime is a $575 billion growth industry , Infoworld pointed out “that amount of crime has persisted for a long time, well before the Internet.” The article included these 5 reasons... Read More
The announcement on June 4th of a massive cybersecurity attack that compromised data stored on Office of Personnel Management (OPM) systems for 4.2 million current and former federal employees is the most recent head-smacking report of how porous the... Read More
The Association of Corporate Counsel Foundation (ACC) released a State of Cybersecurity report underwritten by Ballard Spahr on December 9, 2015. The report provides valuable insights on cybersecurity issues from more than 1,000 corporate lawyers at 887... Read More
By David Navetta and Kris Kleiner On October 23, 2015, the Federal District Court in Minnesota upheld Target’s assertion that documents produced pursuant to an internal investigation of its 2013 security incident fell within the protections of... Read More