Features
Blockchain: A Short Primer for Lawyers
This article familiarizes lawyers with cryptocurrency and, particularly, the enabling blockchain technology, methodologies and systems. It also introduces lawyers to blockchain's current and future uses and points to other resources to learn more about this profoundly disruptive and promising collection of technological advancements.
Features
New York State's Financial Services Cybersecurity Regulation
The Regulation was designed to promote the protection of customer information as well as the underlying information technology systems of regulated entities in light of the ever-increasing threat of cyber attacks.
Features
Is Your Law Firm Running 'Encryption Light?'
With so many warnings to lawyers about transmitting unsecured email and attachments, it can be difficult to understand the solutions available and how they differ. Some may improve security but make communications cumbersome. If too cumbersome, users seek a way to work around them or choose less powerful tools.
Features
Cyber Spies: In-House Legal Fights Back Against Cyberespionage
<b><i>An Exploration of the Modern Cyberespionage Threat and How In-House Legal Departments Are Fighting Back</b></i><p>Though faced with limited legal remedies, counsel are coming up with creative new ways to go after cyberespionage actors, and partnering with an array of cyber professionals and government agencies to combat the threat.
Features
The 'Soft Underbelly' of Cybersecurity Meets Legal Ethics
Legal departments for business organizations rate cybersecurity, regulation and ethics compliance among their chief concerns, and they are well aware of surveys showing law firms to be the "soft underbelly" of business security due to weakness of their cybersecurity.
Features
Data Breaches by Employees<br><b><i><font="-1">How to Keep Your Company Out of the Headlines</b></i></font>
The more we understand about how data breach incidents originate and propagate, the more likely we are to shift focus from outsider hackers to insider (employee) threats. Insider threats can be malicious, but often they are accidental.
Features
<b><i>Online Extra</b></i><br>Are You Ready for the New China Cybersecurity Law?
<b><i>A Consilio Survey Found 75% of Legal Tech Professionals Are Unfamiliar with the Law, But Multinational Companies Can Still Prepare Before the June Implementation</b></i><p>In December 2016, China passed a comprehensive Cybersecurity Law, expanding the country's data localization requirement once it goes into effect this June and sparking heated debate among Chinese lawmakers. Some experts say even more legislation could be on the way.
Features
Client Data in the Age of Digital Technologies and Cyber Warfare
Ubiquitous news of law firm data breaches, even among BigLaw, spotlights a treasure trove of trade secrets, confidential and strategic transactions, and sensitive client information. No wonder law firms are perceived to be attractive targets of cyber-attacks. Attractive? You can't help that. Easy? Not so fast.
Features
<i>BREAKING NEWS</i><br>Yahoo General Counsel Ron Bell Resigns Amid Data Breach Controversy
Yahoo Inc. announced on March 1 that general counsel Ron Bell is leaving the tech giant after an investigation of the company revealed that its legal team failed to sufficiently inquire into a massive 2014 cybersecurity breach.
Features
Cybersecurity Insurance<br><b><i><font="-1">Untangling the Mystery</b></i></font>
High-profile breaches have encouraged many businesses to proactively assess their cyber liabilities, and implement prevention and response plans. Fortunately, there are more technology options available to protect businesses than ever before, and both the U.S. government and private industry have made great strides in understanding and combating some of the most common cyber threats.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity LitigationWhile the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.Read More ›
- Marketing Analytics: More Is Not Always BestIn the past few decades, law firms have made great strides in catching up with the rest of the corporate world and are reaping the benefits of all kinds of marketing. This acceptance by firm management is in great part due to an increased appreciation of analytics, made possible by digital marketing and social media.Read More ›
