LexisNexis® Legal Newsroom
Peter S. Vogel: Bad News- You’re Not Entitled to Privacy When You Make A ‘Butt Call’!

By Peter S. Vogel A court ruled that there is no privacy to people who make “butt calls” and particularly when the party making the “butt call” admitted “that he was aware of the risk of making inadvertent pocket-dial calls and had previously made such calls on his cellphone...

Peter S. Vogel: HIPAA Violation From Cyberattack That Exposes 4.5 Million Patients At UCLA Health?

By Peter S. Vogel In July 2011 UCLA Health settled HIPAA violation, paid a fine of $865,000 , and “committed to a corrective action plan aimed at remedying gaps in its compliance with the rules,” but they were not prepared for a 2014 cyberattack because of July 17, 2015 UCLA issued a press...

Peter S. Vogel: EU Demands That Google’s ‘Right To Be Forgotten’ To Be Worldwide Searches, Not Just In The EU

By Peter S. Vogel Google is fighting a June 2015 order from the French CNIL (Commission nationale de l’informatique et des libertés) that ordered Google to “delist links not just from all European versions of Search but also from all versions globally.” Google’s Global...

Peter S. Vogel: Legal Departments Cause Lots of Cyberintrusions by Opening Too Much Phish!

By Peter S. Vogel Verizon’s 2015 Data Breach Investigations Repor t identified that the legal, communications, and customer service departments “were far more likely to actually open an e-mail than all other departments.” My blog entitled “ Phishing and Malware Cyberattacks...

Peter S. Vogel: Cyber & Legal Risks All Over These 45 Security And Privacy Blind Spots!

By Peter S. Vogel Everyone should be interested in a recent Blind Spot Report which was created because of the “demand for accountability in respect to privacy protection is growing, and security professionals are finding themselves in part responsible for this issue.” The International...

Peter S. Vogel: What A Great Idea – Keep A Cybersecurity Attorney On Retainer!

By Peter S. Vogel Since “99% of incident response and forensics is run through IT not counsel” businesses should follow Computerworld’s advice about managing cyberintrusions since “time is not a friend in any breach situation, companies that have cyber security attorneys on...

Peter S. Vogel: Alert To All Lawyers – Inevitable Data And IT Disasters May Destroy Client Files!

By Peter S. Vogel A recent report warned that lawyers have an “ethical and regulatory responsibility to protect your client’s confidential information, it is imperative that you have a plan in place to protect your data from loss, corruption or theft.” Abacus Data Systems issued...

Peter S. Vogel: 5 Things Every Lawyer Needs To Know About Cyberinsurance!

By Peter S. Vogel Lawyers should take advantage of Computerworld’s recent update to IT professionals about cyberinsurance which included Gartner’s definition of cyberinsurance “as protection against losses stemming from data theft and data loss, or business interruptions caused by...

Peter S. Vogel: Surprise! Cyberintrusions Are Directed At eDiscovery Evidence

By Peter S. Vogel eDiscovery is the monster that ate Cleveland as everyone knows, but storing the ESI (Electronically Stored Information) is at risk to cyberintrusions since the ESI includes “highly sensitive information” as reported by my good friend Monica Bay in Legaltech News. Monica’s...

Peter S. Vogel: Cybercriminals Know How To Access Law Firms

By Peter S. Vogel Aderant recently published an article entitled the “5 Deadly Sins Cyber Criminals Know About Law Firm Security” written by Lewis Thomason CFO William Kunkel, attorney Joy Justin, and consultants from Sword & Shield. The first deadly sin everyone know about: 1....

Peter S. Vogel: Lawyers Looking For Witnesses & Evidence Need To Know About Internet Anonymity!

By Peter S. Vogel Infoworld recently reported about how folks can become anonymous on the Internet which comes in the wake of the 37 million individuals who were exposed in the Ashley Madison hack. The August 25, 2015 report was entitled “9 steps to make you completely anonymous online”...

Peter S. Vogel: Google Law: Google Decides if Sites May Force Apps

By Peter S. Vogel One might conclude that Google is the Internet law maker after “Google said that starting in November it would begin penalizing sites that show these “please install our app” ads.” The New York Times article on September 2, 2015 entitled “ Competitors...

Peter S. Vogel: CYBERALERT: .zip and .review are in the Top 10 Most Dangerous Top Level Domains (TLD)!

By Peter S. Vogel Most folks ignore anything to the right of the “.” but Blue Coat warns about the explosion in TLDs and “created a list rating the web’s shadiest and safest neighborhoods” based “on analysis of web requests from more than 15,000 worldwide businesses...

Peter S. Vogel: 11 Things to Do Before Your Laptop (Cell or Tablet) Disappears

By Peter S. Vogel I paste business cards to all new laptops, iPhones, and iPads because maybe somebody will steal the device or I might just lose it, which is likely since Networkworld estimates are “that a laptop is lost every 53 seconds.” The September 10, 2015 Networkworld report is...

Peter S. Vogel: FBI ALERT: Cyberattacks Directed at IoT (Internet of Things!) and Strong Passwords Can Help!

By Peter S. Vogel The FBI “is warning companies and the general public to be aware of IoT vulnerabilities cybercriminals could exploit” and encourages the use of strong passwords according to a FBI September 10, 2015 Public Service Announcement (PSA) entitled “ Internet of Things...

Peter S. Vogel: Cyberattacks on the Radar of Law Firms

By Peter S. Vogel With the help of the financial services industry “the legal sector has launched its own cyber-threat intelligence-sharing mechanism” known as the Legal Services Information Sharing and Analysis Organization (LS-ISAO) Services. The August 2015 Darkreading article entitled...

Peter S. Vogel: Mimecast Confesses that Cloud Mail Outage was DDoS Attack!

By Peter S. Vogel The Mimecast Incident Report stated that the US Data Centers and disruption of millions of emails were caused by a DDoS (Distributed Denial of Service) attack on September 21 from “10:46 am EST – 5:32pm EST.” The September 25, 2015 Incident Report summarized the...

Peter S. Vogel: Ransomware Alert: Client Data at Risk for Lawyers and Accountants!

By Peter S. Vogel The volume of Ransomware is increasing dramatically after malware is downloaded by unsuspecting employees “encrypts a user or company’s fi­les and forces them to pay a fee to the hacker in order to regain access to their own ­files.” KnowBe4 claims to be...

Peter S. Vogel: Is the Android Part of Google’s Antitrust Strategy?

By Peter S. Vogel The NY Times reported that “regulators are looking at whether Google unfairly uses the software to promote its other dominant services.” The report entitled “ F.T.C. Is Said to Investigate Claims That Google Used Android to Promote Its Products ” is based...

Peter S. Vogel: Cyber Theft of Millions Caused by Phishing Malware!

By Peter S. Vogel Criminal charges have been filed against the botnet administrator of “Bugat,” “Cridex” or “Dridex” which is a “sophisticated malware package designed to steal banking and other credentials from infected computers” and the “FBI...

Peter S. Vogel: SEC Declares Planning for Prevention and Detection of Cyber Intrusions is Essential!

By Peter S. Vogel In a recent speech SEC Chair Mary Jo White declared that while “cybersecurity attacks cannot be entirely eliminated, it is incumbent upon private fund advisers to employ robust, state-of-the-art plans to prevent, detect, and respond to such intrusions.” On October 16...

Peter S. Vogel: Cyber Intrusion Responsibility Shared by General Counsel & IT

By Peter S. Vogel It is imperative that General Counsel learn IT technology and lingo- and that IT legal jargon given a recent survey identified that in almost 450 companies 31% rely on IT and 21% rely on General Counsel to be primarily responsible for assuring legal compliance when cyber intrusion...

Peter S. Vogel: Cyber Intrusion Planning Should Include Training Employees about eMail

By Peter S. Vogel Everyone should already know cyber intrusions are “when not if,” so the Federal Communications Commission (FCC) prepare a tool which “is designed for businesses that lack the resources to hire dedicated staff to protect their business, information and customers...

Peter S. Vogel: Advice about Cybersecurity Blind Spots Including Cloud Access

By Peter S. Vogel A report from Tenable Network Security identifies that blind spots “can increase legal risk because information retention policies designed to limit legal liability are very unlikely to be applied to electronically stored information (ESI) contained on unauthorized cloud, mobile...

Peter S. Vogel: MaaS (Malware-as-a-Service) – the Cybercrime Cloud Service NO ONE Wants to Think about

By Peter S. Vogel According to the 2015 Threat Report about MaaS is that the “ average price for exploit kits is usually between $800- $1,500 a month, depending on the features and add-ons” and the “price is likely to remain low due to increased competition.” The Websense Report...