LexisNexis® Legal Newsroom
Peter S. Vogel: Cybercrime is Growth Industry Estimated to be as Much as $575 Billion

By Peter S. Vogel A recent report estimates that the ”cost of cybercrime includes the effect of hundreds of millions of people having their personal information stolen—incidents in the last year include more than 40 million people in the US, 54 million in Turkey, 20 million in Korea, 16...

Peter S. Vogel: Judge Allows Libel Suit Based on Google Autocomplete Search Results

By Peter S. Vogel A Hong Kong Judge disagreed with Google that Google’s Autocomplete may have created libeleous content and “cited Europe’s recent ‘right to be forgotten’ ruling requiring Google to remove embarrassing or outdated search results upon request” as...

Peter S. Vogel: Cybercrime is Getting Worse – 5 Reasons

By Peter S. Vogel On the heels of the recent report that cybercrime is a $575 billion growth industry , Infoworld pointed out “that amount of crime has persisted for a long time, well before the Internet.” The article included these 5 reasons why cybercrime is worse than ever : 1. Internet...

Peter S. Vogel: NO EVIDENCE That ‘Personal Information Was Ever Transmitted,’ So Google Wins Privacy Lawsuit!

By Peter S. Vogel Android users lost their lawsuit claiming that Google “violated its own privacy policy by disclosing their names, email addresses and account locations to third parties without permission, to boost advertising revenue” according to Reuters . On July 15, 2015 U.S. Magistrate...

Peter S. Vogel: Bad News- You’re Not Entitled to Privacy When You Make A ‘Butt Call’!

By Peter S. Vogel A court ruled that there is no privacy to people who make “butt calls” and particularly when the party making the “butt call” admitted “that he was aware of the risk of making inadvertent pocket-dial calls and had previously made such calls on his cellphone...

Peter S. Vogel: HIPAA Violation From Cyberattack That Exposes 4.5 Million Patients At UCLA Health?

By Peter S. Vogel In July 2011 UCLA Health settled HIPAA violation, paid a fine of $865,000 , and “committed to a corrective action plan aimed at remedying gaps in its compliance with the rules,” but they were not prepared for a 2014 cyberattack because of July 17, 2015 UCLA issued a press...

Peter S. Vogel: EU Demands That Google’s ‘Right To Be Forgotten’ To Be Worldwide Searches, Not Just In The EU

By Peter S. Vogel Google is fighting a June 2015 order from the French CNIL (Commission nationale de l’informatique et des libertés) that ordered Google to “delist links not just from all European versions of Search but also from all versions globally.” Google’s Global...

Peter S. Vogel: Legal Departments Cause Lots of Cyberintrusions by Opening Too Much Phish!

By Peter S. Vogel Verizon’s 2015 Data Breach Investigations Repor t identified that the legal, communications, and customer service departments “were far more likely to actually open an e-mail than all other departments.” My blog entitled “ Phishing and Malware Cyberattacks...

Peter S. Vogel: Cyber & Legal Risks All Over These 45 Security And Privacy Blind Spots!

By Peter S. Vogel Everyone should be interested in a recent Blind Spot Report which was created because of the “demand for accountability in respect to privacy protection is growing, and security professionals are finding themselves in part responsible for this issue.” The International...

Peter S. Vogel: What A Great Idea – Keep A Cybersecurity Attorney On Retainer!

By Peter S. Vogel Since “99% of incident response and forensics is run through IT not counsel” businesses should follow Computerworld’s advice about managing cyberintrusions since “time is not a friend in any breach situation, companies that have cyber security attorneys on...

Peter S. Vogel: Alert To All Lawyers – Inevitable Data And IT Disasters May Destroy Client Files!

By Peter S. Vogel A recent report warned that lawyers have an “ethical and regulatory responsibility to protect your client’s confidential information, it is imperative that you have a plan in place to protect your data from loss, corruption or theft.” Abacus Data Systems issued...

Peter S. Vogel: 5 Things Every Lawyer Needs To Know About Cyberinsurance!

By Peter S. Vogel Lawyers should take advantage of Computerworld’s recent update to IT professionals about cyberinsurance which included Gartner’s definition of cyberinsurance “as protection against losses stemming from data theft and data loss, or business interruptions caused by...

Peter S. Vogel: Surprise! Cyberintrusions Are Directed At eDiscovery Evidence

By Peter S. Vogel eDiscovery is the monster that ate Cleveland as everyone knows, but storing the ESI (Electronically Stored Information) is at risk to cyberintrusions since the ESI includes “highly sensitive information” as reported by my good friend Monica Bay in Legaltech News. Monica’s...

Peter S. Vogel: Cybercriminals Know How To Access Law Firms

By Peter S. Vogel Aderant recently published an article entitled the “5 Deadly Sins Cyber Criminals Know About Law Firm Security” written by Lewis Thomason CFO William Kunkel, attorney Joy Justin, and consultants from Sword & Shield. The first deadly sin everyone know about: 1....

Peter S. Vogel: Lawyers Looking For Witnesses & Evidence Need To Know About Internet Anonymity!

By Peter S. Vogel Infoworld recently reported about how folks can become anonymous on the Internet which comes in the wake of the 37 million individuals who were exposed in the Ashley Madison hack. The August 25, 2015 report was entitled “9 steps to make you completely anonymous online”...

Peter S. Vogel: Google Law: Google Decides if Sites May Force Apps

By Peter S. Vogel One might conclude that Google is the Internet law maker after “Google said that starting in November it would begin penalizing sites that show these “please install our app” ads.” The New York Times article on September 2, 2015 entitled “ Competitors...

Peter S. Vogel: CYBERALERT: .zip and .review are in the Top 10 Most Dangerous Top Level Domains (TLD)!

By Peter S. Vogel Most folks ignore anything to the right of the “.” but Blue Coat warns about the explosion in TLDs and “created a list rating the web’s shadiest and safest neighborhoods” based “on analysis of web requests from more than 15,000 worldwide businesses...

Peter S. Vogel: 11 Things to Do Before Your Laptop (Cell or Tablet) Disappears

By Peter S. Vogel I paste business cards to all new laptops, iPhones, and iPads because maybe somebody will steal the device or I might just lose it, which is likely since Networkworld estimates are “that a laptop is lost every 53 seconds.” The September 10, 2015 Networkworld report is...

Peter S. Vogel: FBI ALERT: Cyberattacks Directed at IoT (Internet of Things!) and Strong Passwords Can Help!

By Peter S. Vogel The FBI “is warning companies and the general public to be aware of IoT vulnerabilities cybercriminals could exploit” and encourages the use of strong passwords according to a FBI September 10, 2015 Public Service Announcement (PSA) entitled “ Internet of Things...

Peter S. Vogel: Cyber Theft of Millions Caused by Phishing Malware!

By Peter S. Vogel Criminal charges have been filed against the botnet administrator of “Bugat,” “Cridex” or “Dridex” which is a “sophisticated malware package designed to steal banking and other credentials from infected computers” and the “FBI...

Peter S. Vogel: SEC Declares Planning for Prevention and Detection of Cyber Intrusions is Essential!

By Peter S. Vogel In a recent speech SEC Chair Mary Jo White declared that while “cybersecurity attacks cannot be entirely eliminated, it is incumbent upon private fund advisers to employ robust, state-of-the-art plans to prevent, detect, and respond to such intrusions.” On October 16...

Peter S. Vogel: Cyber Intrusion Responsibility Shared by General Counsel & IT

By Peter S. Vogel It is imperative that General Counsel learn IT technology and lingo- and that IT legal jargon given a recent survey identified that in almost 450 companies 31% rely on IT and 21% rely on General Counsel to be primarily responsible for assuring legal compliance when cyber intrusion...

Peter S. Vogel: Cyber Intrusion Planning Should Include Training Employees about eMail

By Peter S. Vogel Everyone should already know cyber intrusions are “when not if,” so the Federal Communications Commission (FCC) prepare a tool which “is designed for businesses that lack the resources to hire dedicated staff to protect their business, information and customers...

Peter S. Vogel: Advice about Cybersecurity Blind Spots Including Cloud Access

By Peter S. Vogel A report from Tenable Network Security identifies that blind spots “can increase legal risk because information retention policies designed to limit legal liability are very unlikely to be applied to electronically stored information (ESI) contained on unauthorized cloud, mobile...

Peter S. Vogel: MaaS (Malware-as-a-Service) – the Cybercrime Cloud Service NO ONE Wants to Think about

By Peter S. Vogel According to the 2015 Threat Report about MaaS is that the “ average price for exploit kits is usually between $800- $1,500 a month, depending on the features and add-ons” and the “price is likely to remain low due to increased competition.” The Websense Report...