Features
WannaCry Attack Is a Wakeup Call for Cyber Preparedness
Until May 12, 2017, the more highly publicized ransomware incidents were localized targets impacting only one or a small number of businesses. WannaCry made it clear that ransomware could reach a broad cross-section of computers worldwide, at essentially the same time. There are very few, if any, businesses that can safely say they are not targets for cyber-criminals, because at the very least, businesses have personnel records for their employees.
Features
Ransomware Attack on DLA Piper Puts Law Firms, Clients on Red Alert
The ransomware attack on June 27 on DLA Piper sounded an alarm for Big Law. The world's biggest firms are just as prone to ransomware attacks as any other company, and the potential ramifications of a network-crippling malware infection are wide-ranging for a service industry that holds the legal fate of corporations in its palm.
Features
Managing Cyber Risks in Medical Practices
<b><I>Part One of a Two-Part Article</I></b><p>We often associate cyber-risks with financial institutions, but while the financial sector certainly does deal with cyber-risks, it is by no means the only industry facing such woes. Health care providers are also vulnerable to cyber-liability risks.
Features
Cybersecurity After WannaCry
Following the May 2017 WannaCry ransomware infiltration into over 10,000 organizations and individuals in over 150 countries, it is clear that businesses across industries have no choice but to spend time and resources digesting and culling through the cybersecurity information barrage.
Features
Ransomware Attack on DLA Piper Puts Law Firms, Clients on Red Alert
By now, every managing partner has heard the warning: Law firms and their clients' sensitive information are a treasure trove for hackers.But the ransomware…
Features
Are Your Post-Breach Forensic Reports Privileged?
<b><i>A Trend Is Emerging</b></i><p>The Central District of California recently joined the small growing list of courts that have held forensic reports created by outside security companies following a data breach are protected from disclosure in civil litigation in certain circumstances.
Features
WannaCry Attack Is A Wake-Up Call for Cyber Preparedness
The scope of WannaCry changed our perceptions of ransomware attacks. It made it clear that ransomware could reach a broad cross-section of computers worldwide, at essentially the same time.
Features
Asserting Damages for Data Piracy Under the CFAA
When a database is breached in one way or another, the results can be devastating. Many companies suffering this kind of loss turn to litigation, often under the Computer Fraud and Abuse Act, which prohibits improperly accessing a protected computer. There is, however, a growing consensus in the Second Circuit that recovery of certain forms of damages under the CFAA simply is not permitted.
Features
3 Steps to Ensuring Your AI Initiative Does Not Fail
The energy in the legal industry surrounding artificial intelligence (AI) is undeniable. Law firms are investing in innovation or undertaking experiments to test the viability of applying AI-enabled tools to various disciplines. Legal professionals are packing presentations to learn if, how and when the heralded disruption will impact their careers.
Features
GDPR Gets Real
A procrastinator's guide to overcoming technical challenges in GDPR compliance.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- The Binding Effect of Plea Agreements In White Collar CrimesFederal plea agreements sometimes state explicitly that they are limited to that one office and do not bind other U.S. attorney's offices. In this article, we discuss the circuit courts' competing approaches to interpreting the binding effect of plea agreements and the Department of Justice policy.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›
- Issues in Reverse Morals Clauses In Talent Influencer Contracts With Product BrandsThe next company general counsel to slide a morality clause across the desk for a celebrity or web influencer to sign shouldn't be surprised if that talent also whips out a morals clause, one to cancel the contract if the company's brand acts immorally.Read More ›