Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Retail Leads the Way in Data Breaches — Here's How to Protect Your Customers Image

Retail Leads the Way in Data Breaches — Here's How to Protect Your Customers

Paige Schaffer

If 2017 was considered the “year of the data breach” as the number of incidents hit a new record high of 1,579, 2018 might get even more serious. Just a little more than halfway through 2018, the number and scale of data breaches that have already been reported is staggering.

Features

Cybersecurity Roundtable: Chicago's Tech Experts Answer Three Critical Cybersecurity Questions Image

Cybersecurity Roundtable: Chicago's Tech Experts Answer Three Critical Cybersecurity Questions

Adam Schlagman

Earlier this summer a group of security-minded executives in Chicago, long a hub for legal and financial tech, sat down for a panel discussion on anticipating and combatting cybercrime.

Features

Get Ready for California's Version of the EU General Data Protection Regulation Image

Get Ready for California's Version of the EU General Data Protection Regulation

Jacqueline Klosek

The entertainment industry is intensely focused on data collection and analytics as it seeks to maximize the exploitation of digital content. Just as those of us in the privacy field had begun to have a slight breather as much of the heavy lifting on the GDPR was finally behind us, lawmakers in California have passed the California Consumer Privacy Act of 2018 (CCPA).

Features

General Data Protection Regulation: Defense or Offense? Image

General Data Protection Regulation: Defense or Offense?

Nina Cunningham

Ostensibly, GDPR's mission is to strengthen and unify the EU's protection of online privacy rights and promote data protection for citizens of the 28 countries currently in the EU. In the global economy, however, GDPR serves as an alarm to all countries with business flowing across Europe and well beyond. Where business flows, data follow.

Features

Five Takeaways from Recent Cybersecurity Developments by Colorado and the SEC Image

Five Takeaways from Recent Cybersecurity Developments by Colorado and the SEC

Brian Neil Hoffman

Colorado recently adopted a new law expanding companies' obligations in the event of a cybersecurity incident, and establishing new data security and disposal obligations. Recent announcements by the SEC likewise emphasize important responsive points for both companies and their personnel in the wake of an incident. Five key takeaways from these developments are highlighted in this article.

Features

Issues Between EU Data Protection, Use of Blockchain Image

Issues Between EU Data Protection, Use of Blockchain

Justin Hectus & Kristy Sambor

Emerging technologies and regulations have the power to create, shape or kill businesses. For the entertainment industry, the European Union's (EU) General Data Protection Regulation (GDPR) and blockchain technology each embody forces that have the potential for profound impact. Taken in tandem, the GDPR and blockchain highlight the possibilities and pitfalls of disruption and the importance of cross-organizational collaboration in compliance and innovation initiatives.

Features

Blockchain and GDPR — Frenemies? Image

Blockchain and GDPR — Frenemies?

Justin Hectus & Kristy Sambor

In a nutshell, GDPR mandates that individuals have access and control over the use and maintenance of their data in certain circumstances, while the foundation of blockchain relies on the immutability of data. On the surface, these concepts seem in direct conflict with each other. This article discusses the points where GDPR and blockchain share common ground, where conflicts may exist and possible approaches for mitigating those conflicts.

Features

Why Encryption Is the Key to Ensure Data Privacy in the Cloud Image

Why Encryption Is the Key to Ensure Data Privacy in the Cloud

Linus Chang

At both a personal and corporate level, there are huge gains to be made in protecting against data breaches. The fact is that well-implemented client-side encryption — where the corporate user keeps their own key rather than entrusting a third party to guard their sensitive information — is the only sure way to guarantee data privacy when storing data on other people's servers.

Features

This is Not Your Father's Cloud (Part Two) Image

This is Not Your Father's Cloud (Part Two)

Adam Cohen

<b><i>Part Two of a Two-Part Article</b></i><p>In Part One of this article last month, we began a discussion designed to demystify the hesitations behind cloud security and analyzed the fast-growing transformation to a range of newer technical approaches with important consequences for legal practice. This month we continue the discussion by tackling the security and legal implications of the mass transformation of enterprise IT to cloud services from leading providers such as AWS and Azure.

Features

Balancing Fourth Amendment Expectations in the Electronic Era Image

Balancing Fourth Amendment Expectations in the Electronic Era

Jonathan S. Feld, Dante Stella & Christina Brunty

As rapid technological changes in the 21st century continue to expand the types and volume of private electronic information, the Fourth Amendment's privacy protections are evolving. The critical question in Fourth Amendment cases is whether a person has a “reasonable expectation of privacy in the information or event.”

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Bankruptcy Sales: Finding a Diamond In the Rough
    There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
    Read More ›