LexisNexis® Legal Newsroom
Zurich’s Brad Gow on Cyber Coverage – Part 2

Brad Gow says the decade-old business of providing coverage for computer networks has changed dramatically in a short time. As senior vice president at Zurich North America focusing on professional liability, Gow says a business that used to be about losses from viruses is now one that also deals with...

Zurich’s Brad Gow on Cyber Coverage – Part 1

Brad Gow says the decade-old business of providing coverage for computer networks has changed dramatically in a short time. As senior vice president at Zurich North America focusing on professional liability, Gow says a business that used to be about losses from viruses is now one that also deals with...

Troutman Sanders LLP: 'Facing' Reality: Facebook Knows What You Look Like

It's a bit odd to think that about whether you have a privacy right in what you look like. But as companies continue to gather enormous amounts of all kinds of data - including faces - and wrestle with whether they can monetize that data, the fear of "Big Brother" continues to spark debate...

Peter S. Vogel: How to Avoid Cloud Contract Disasters

By Peter S. Vogel | A bad cloud contract can devastate any business, and a recent article “ 8 sure-fire ways to screw up a cloud contrac t” should be a wake-up call, but unfortunately many businesses learn the hard way. By way of example, a recent cloud contract that I negotiated contained...

Foley & Lardner LLP: Why Study the Draft 2014 National Nanotech Initiative Strategic Plan?

By Stephen B. Mathus The NNI has just released its 2014 draft Strategic Plan for public comment. Aside from the opportunity to submit comments, becoming familiar with the plan offers a number of benefits to nanotech ventures. One is that it provides a useful overview of the agencies involved, which...

Foley & Lardner LLP: Have Your Safeguards For Protecting Confidential Information Kept Pace With Your Next-Generation Manufacturing Processes?

Today’s next-generation manufacturing is marked by speed and technology. However, technology can be a double-edged sword. On one hand, technological innovations and advancements have resulted in a manufacturing resurgence in the United States. On the other hand, technology also makes confidential...

Supreme Court: Police Can’t Search Cell Phones Without Warrant

WASHINGTON, D.C. — (Mealey’s) The police generally may not, without a warrant, search digital information on a cell phone seized from a person who has been arrested, the U.S. Supreme Court found today, ruling on two cases consolidated on appeal ( David Leon Riley v. State of California ,...

Ballard Spahr LLP: FFIEC Tool Helps You Assess Cyber Risk

The Federal Financial Institutions Examination Council (FFIEC) has released its long-awaited Cybersecurity Assessment Tool (Assessment) to help financial institutions identify the inherent risks faced by a company and determine the level of maturity of a company’s cybersecurity preparedness. The...

Keller and Heckman LLP Telecom Business Alert – 900 MHz Broadband, Drones, Net Neutrality, FirstNet, NG911, And Data Security

900 MHz Reallocation | Almost a dozen parties filed comments last week in response to the FCC’s Public Notice seeking input on a supplement to the Petition for Rulemaking filed jointly by Pacific DataVision, Inc. (PDV) and the Enterprise Wireless Alliance (EWA). The Petition seeks to realign...

Peter S. Vogel: Cyber Rewards – A New Concept In Airline Mileage Reward Program?

By Peter S. Vogel According to the Washington Post United Airlines “had rewarded two people with 1 million free miles of air travel each for discovering and disclosing software defects through the airlines “bug bounty” program…. so named because it offers bounties for the...

Peter S. Vogel: Cyberattacks on the Radar of Law Firms

By Peter S. Vogel With the help of the financial services industry “the legal sector has launched its own cyber-threat intelligence-sharing mechanism” known as the Legal Services Information Sharing and Analysis Organization (LS-ISAO) Services. The August 2015 Darkreading article entitled...

Peter S. Vogel: Mimecast Confesses that Cloud Mail Outage was DDoS Attack!

By Peter S. Vogel The Mimecast Incident Report stated that the US Data Centers and disruption of millions of emails were caused by a DDoS (Distributed Denial of Service) attack on September 21 from “10:46 am EST – 5:32pm EST.” The September 25, 2015 Incident Report summarized the...

Peter S. Vogel: Ransomware Alert: Client Data at Risk for Lawyers and Accountants!

By Peter S. Vogel The volume of Ransomware is increasing dramatically after malware is downloaded by unsuspecting employees “encrypts a user or company’s fi­les and forces them to pay a fee to the hacker in order to regain access to their own ­files.” KnowBe4 claims to be...

Peter S. Vogel: Is the Android Part of Google’s Antitrust Strategy?

By Peter S. Vogel The NY Times reported that “regulators are looking at whether Google unfairly uses the software to promote its other dominant services.” The report entitled “ F.T.C. Is Said to Investigate Claims That Google Used Android to Promote Its Products ” is based...

Foley & Lardner LLP: 3 Trending Topics in IoT: Privacy, Security, and Fog Computing

By Shabbi S. Khan Cisco has estimated that there will be 50 billion Internet of Things (IoT) devices connected to the Internet by the year 2020. IoT has been a buzzword over the past couple of years. However, the buzz surrounding IoT in the year 2015 has IoT enthusiasts particularly excited. This...