Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Coronavirus Work-from-Home Response A Boon for Cybercriminal Exploitation Image

Coronavirus Work-from-Home Response A Boon for Cybercriminal Exploitation

Mark Sangster

Companies determined to protect their employees and minimize the impact of COVID-19 are enforcing travel restrictions and strong work-from-home policies. However those actions can be used against employees as any firms are likely unprepared for the criminal appetite for the cyberattack exploitation of a remote workforce. Here are some of the key issues of which law firms and companies need to be aware and steps that should be considered to minimize the risk to keep everyone — and client data — safe.

Features

COVID-19: Threats Abound: How to Protect Your Remote Workforce Image

COVID-19: Threats Abound: How to Protect Your Remote Workforce

Tomas Suros

The COVID-19 pandemic has changed the conversation around remote work. As more employees work remotely, law firms must employ security best practices to ensure that the extended reliance on the cloud doesn't expose sensitive data or cripple daily operations. Following is a practical checklist of systems, technologies and processes to consider when evolving your firm for remote work and selecting your cloud technology provider.

Features

COVID-19: Companies, Trade Organizations Seek to Postpone CCPA Enforcement Date Image

COVID-19: Companies, Trade Organizations Seek to Postpone CCPA Enforcement Date

Dan Clark

Over 30 trade associations and companies co-signed a letter last month to California Attorney General Xavier Becerra asking him to push back the enforcement date for the California Consumer Privacy Act due to the new coronavirus and a lack of clarity on the enforcement rules.

Features

The California Consumer Privacy Act is HERE: Are You Litigation Ready? Image

The California Consumer Privacy Act is HERE: Are You Litigation Ready?

Ann Marie Mortimer, Jason J. Kim & Lisa J. Sotto

Most companies doing business in California are well aware of the CCPA and prepared diligently in advance of the law's Jan. 1, 2020 compliance deadline. While compliance certainly is key, even compliant businesses must consider — and prepare for — the eventual onslaught of class action litigation that is coming.

Features

States Take the Lead on Securing IoT Image

States Take the Lead on Securing IoT

Ashley Thomas

The California IoT Security Law is the first of its kind in the nation and pushes device manufacturers to adopt cybersecurity standards during the product development and design stages where none have existed before.

Features

Coronavirus Work-from-Home Response A Boon for Cybercriminal Exploitation Image

Coronavirus Work-from-Home Response A Boon for Cybercriminal Exploitation

Mark Sangster

Here are some of the key issues of which law firms and companies need to be aware and steps that should be considered to minimize the risk to keep everyone — and client data — safe.

Features

Litigators and Privacy: The Last People You Want to See, or the First? Image

Litigators and Privacy: The Last People You Want to See, or the First?

Michael Bahar, Sarah Paul, Matt Gatewood & Andrew Weiner

In their consideration of possible worst-case cyber attack scenarios, organizations often focus on the various types of attacks and their relative severity. But, the worst-case scenario is not the breach, it's the reputational damage, regulatory enforcement action, the business interruption, and the inevitable litigation that follows a poorly handled breach from an unprepared organization. Given this reality, it is important to adjust planning assumptions and response scenarios to focus on addressing these drivers of post-breach exposure.

Features

In the Know: Top 5 Legal Technology Trends for the 2020s Image

In the Know: Top 5 Legal Technology Trends for the 2020s

Deb Dobson

Technology allows attorneys to keep informed so they can help their clients understand the potential impact on their company.

Features

Defining Reasonable Care for the Protection of Personal Data Image

Defining Reasonable Care for the Protection of Personal Data

Devin Chwastyk

The Pennsylvania Supreme Court enlivened the Thanksgiving holidays of privacy lawyers in 2018 with its decision in Dittman v. UPMC, which held that an employer has a legal duty to exercise reasonable care to safeguard employees' personal information. While the scope of the decision technically was confined to the employer-employee relationship, the court's reasoning implies that such a duty of reasonable care may arise in any scenario where one party engages in the collection of personal information.

Features

Florida Lawmakers Introduce Online Privacy Legislation Image

Florida Lawmakers Introduce Online Privacy Legislation

David M. Stauss & Malia Rogers

Florida lawmakers have introduced companion bills in the Florida House (HB 963) and Senate (SB 1670) that would create limited online privacy rights and obligations in the state. The legislation appears to be very similar to the Nevada Online Privacy Protection Act, which was amended last year to add a right to opt-out of sales of covered information.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›