Features
Uber In-House Attorney Out Behind Massive Cyberattack That Went Undisclosed
<b><i>The Company Failed to Notify 57 Million Users of a Breach In October 2016. Two Employees Tasked with Handling the Response Process Have Left the Company, Including Uber In-House Attorney Craig Clark, Who Reported to the Company's Chief Security Officer.</b></i><p>Uber Technologies Inc. failed to notify 57 million users that their data was exposed in a breach, according to a company blog post published on November 21, which was confirmed by a source close to the matter.
Features
<b><i>Legal Tech</b></i><br>Circumstantial Evidence vs. Speculation: What Warrants e-Discovery Sanctions
In today's political climate, it has almost become "normal" that people frivolously make speculative statements without any proof that the statement is true. While this may be standard practice in the political world, in court this practice will not be convincing to any judge, especially when making an argument for e-discovery sanctions based on new rule FRCP 37(e).
Features
Ransomware: What to Do When It Happens to You
In the event that your company is the victim of a ransomware attack, this article provides steps to be taken as part of its response to such an incident.
Features
Security First Approach Provides a Significant Advantage to Law Firms
Security first is a holistic approach that views security not as an information technology nuisance in need of tight cost-management controls, but as a competitive advantage to differentiation from traditional business offerings. Here's what you need to know.
Features
Podcast: Phishing
Phishing is one of the more pervasive cyber attacks in the world, and while we've all received phishing emails, phishing attacks have become more sophisticated and come in different forms other than emails from Persian princes.
Features
What Lies Beneath the Surface: The Dark Web
This article provides a basic outline of the structure of the Web and some insight as to the purpose for and content housed on each level, as well as give some practical tips to avoid your company's data from ending up on the Dark Web.
Features
When Products Start Teaching Cybersecurity Process
<b><i>New Nuix Cybersecurity Training and Certification Point to Pivot Not Only In Company But In Community At Large</b></i><p>Getting certifications from Nuix is no longer just about mastery of its engine. With a new certification coming to market next quarter, Nuix, like many in the ESI and forensic space (namely Guidance Software, now OpenText), is shifting gears and driving directly into the race for cybersecurity supremacy in an evolving and currently fractured technology marketplace.
Features
The Dark Web
The goals of this article are: 1) to provide a basic outline of the structure of the Web and to provide some insight into the purpose for and content housed on each level; and 2) to give some practical tips on preventing your company's data from ending up on the Dark Web.
Features
<i>Legal Tech</i><br>Sedona Conference Releases Finalized Third Edition of the Sedona Principles
<b><i>The Often-Cited e-Discovery Guidelines Were 'Put Through the Ringer,' and the Result Is Updated Principles and Expanded Commentary for a New Technological Age</b></i><p>Outside of guiding rules of evidence and procedure, the Sedona Principles are perhaps the most often-cited guidelines for handling electronic discovery today. But the Principles had not seen a full-scale rewrite since 2007. Since that time, electronic data sources have exponentially increased and e-discovery itself has morphed into a $10 billion business. The wait, though, has come to a close.
Features
New-Wave Legal Challenges for Bitcoin and Other Cryptocurrencies
As the adoption of cryptocurrencies spreads throughout the business and financial sectors, so too do the concerns that lack of regulation render the new-age currency susceptible to fraud, manipulation, and to being used as a vehicle for money laundering. Nevertheless, recent efforts by U.S. enforcement agencies to apply and enforce financial regulations mean greater scrutiny than ever before.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- The Binding Effect of Plea Agreements In White Collar CrimesFederal plea agreements sometimes state explicitly that they are limited to that one office and do not bind other U.S. attorney's offices. In this article, we discuss the circuit courts' competing approaches to interpreting the binding effect of plea agreements and the Department of Justice policy.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›
- The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business AlliesPractical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.Read More ›