Features
Ransomware – COVID-19 & Upgrading Your Defenses
It's pretty shameful that in the current crisis we're seeing ransomware on the rise. It's even more shameful that organizations involved in fighting the virus seem to be especially at risk.
Features
Facebook and Instagram Developers Sued for Privacy Violations In U.S. and UK
Facebook filed two separate lawsuits in the UK and U.S. that the company says is part of an ongoing effort to hold developers that abuse its platform accountable.
Features
The State of the e-Discovery and Data Privacy Job Market: Pre- and Post-COVID-19, Part 1
Part One of a Two-Part Article This deep dive into the specific cause-and-effect paradigms impacting the data privacy and e-discovery verticals illustrates broader trends in the overall legal technology job market while simultaneously giving professionals in (or eager to be in) those disciplines a clear roadmap of where the legal technology, data privacy, and ESI job market was, is today, and where it will be in the future.
Features
Cybersecurity for Remote Workers: Keeping Financial Information Secure
At the beginning of the COVID-19 pandemic, businesses scrambled to rapidly deploy a remote workforce which created new challenges for businesses to continue operating and providing critical services. It also created an opportunity for malicious actors to hack into and gain access to IT systems and sensitive, personal information.
Features
Where Will the Needle Land?
COVID-19 Contact Tracing v. Protecting Personal Privacy As states roll back stay-at-home orders, contact tracing has quickly emerged as an essential tool to manage the spread of the coronavirus and allow the country to return to work safely. But innovative contact tracing methods raise a host of privacy concerns, forcing a reckoning with how we balance privacy and public health.
Features
Synchronizing Legal Hold Requirements With Consumer Requests for Data Deletion
The biggest challenge with any legal hold process is ensuring that potentially relevant data is actually preserved. But with evolving requirements for how data is managed by new data privacy laws like the CCPA and the GDPR, it's become harder to secure data by simply sending a legal hold and assuming the custodian will do their duty to preserve it.
Features
How To Avoid Cybersecurity Challenges Brought On By the Pandemic
As the current pandemic has forced much of the world into virtual workforce mode, cybercriminals have seized on the uncertainty of the current times to launch new and creative offensives. Fears surrounding COVID-19 are high, conspiracy theories are running rampant, and cyberattackers are counting on stress and distraction to decrease our vigilance against intrusions.
Features
Where Will The Needle Land? COVID-19 Contact Tracing v. Protecting Personal Privacy
Governments and businesses alike are considering how to leverage new technologies to make contact tracing efforts more effective by digitally monitoring our social interactions and physical locations. But such innovative contact tracing methods raise a host of privacy concerns, forcing a reckoning with how we balance privacy and public health.
Features
Recent Decisions Clarify Scope of Illinois Biometric Privacy Law
For users of biometric information subject to BIPA's rigorous requirements, the last two years have brought mostly bad news, most notably a smattering of unfavorable decisions on the question of whether plaintiffs must suffer an injury in order to avail themselves of BIPA. Against this backdrop, however, courts have issued decisions on other aspects of BIPA
Features
How Privacy Laws Shape COVID-19 Reopening Plans
When it comes to processing personal information, Americans do not have a general right to privacy because the United States does not have a comprehensive privacy law. That does not mean, however, that employers are not subject to other privacy requirements.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Restrictive Covenants Meet the Telecommunications Act of 1996Congress enacted the Telecommunications Act of 1996 to encourage development of telecommunications technologies, and in particular, to facilitate growth of the wireless telephone industry. The statute's provisions on pre-emption of state and local regulation have been frequently litigated. Last month, however, the Court of Appeals, in <i>Chambers v. Old Stone Hill Road Associates (see infra<i>, p. 7) faced an issue of first impression: Can neighboring landowners invoke private restrictive covenants to prevent construction of a cellular telephone tower? The court upheld the restrictive covenants, recognizing that the federal statute was designed to reduce state and local regulation of cell phone facilities, not to alter rights created by private agreement.Read More ›
