Features
Online Extra: Facebook's Blockchain Bet Could Place It in the Data Decentralization Debate
<i><b>Oft-Considered an Avenue for Individuals to Attain Greater Control over Their Digital Information, Blockchain Could Be Leveraged By Facebook to Change Its Status As “Gatekeeper” for User Data</i></b><p>Facebook Inc. recently announced that it will begin exploring different ways to incorporate blockchain into its infrastructure. Yet, questions remain over how the social media company will implement the technology and what sort of legal challenges doing so could portend.
Features
Are U.S. Records Retention Requirements on a Collision Course with the GDPR's 'Right to Erasure?'
U.S. laws require companies to retain records for years, and sometimes forever, and violating U.S. records retention laws can result in domestic fines and penalties. How can U.S. companies comply with the GDPR's “right to erasure” while still fulfilling their U.S. records retention obligations?
Features
Life in the (Regulated) Fast Lane: Companies Must Navigate Global Privacy Rules on Self-Driving Cars
<b><i>The race is on to develop the best technology for autonomous vehicles, but there are also drives to increase regulation around the data these cars and trucks collect.</b></i><p>Clearly, it's an exciting time to be in the autonomous car industry, and the race is on to develop the best tech first. But with an increasingly complex legal landscape, lawyers need to focus on compliance with evolving data privacy regulations.
Features
Corporate Counsel Are Tackling Their Data Risk All at Once: Can They Do It?
A new BDO study finds a lack of priorities in data-related spending could, eventually, leave companies overstretched.
Features
<i>Online Extra</i>: Equifax's Liabilities Pile on After Discovery of New Compromised Data
After discovering that 2.4 million of its customers had partial driver's license information stolen, Equifax will likely face renewed questions over the handling of its post-breach internal investigation.
Features
China's Cybersecurity Law Isn't Just About Cybersecurity
The law — which includes data localization mandates, cybersecurity best practices, and data transfer restrictions — has similarities to other cyber laws such as the EU's General Data Protection Regulation (GDPR). But in this case, it's also being used to police internet content and behavior.
Features
The Uber Breach and the Need for an Independent Privacy Function
Uber has incurred significant legal and reputational exposure as a result of the way that the company handled the breach. In the coming months, there will be a great deal of information and regulatory and judicial action that will act as guidance, or more precisely, a checklist of what-not-to-do, for companies that suffer a data breach.
Features
How Blockchain Technology Can Drive the Legal Industry Forward
A new legal structure that bestows and monitors trust must be employed. Is decentralization of traditional, gigantic central bank repositories of data the answer? Is blockchain technology the new path that the legal industry should take to sustain in the digital age? Let us consider the most significant implications of decentralized technologies to the legal industry.
Features
Regulators are Catching Up to Cryptocurrency and Blockchain Technology within the Financial Services Industry
<b><i>Part Two of a Two-Part Article</b></i><p>The proliferation of cryptocurrency and blockchain is being driven by the efficiencies and protections afforded to early adopters. The operational efficiencies and resulting cost savings are readily apparent in the financial services industry and are equally coveted by the entities trying to implement them and by the customers who will benefit from the implementation. However, neither party can fully enjoy these benefits without first understanding and overcoming the various regulatory hurdles.
Features
Top Cybersecurity Takeaways from Relativity Fest 2017
Cybersecurity is a hydra of complexity. Keeping a grasp on it requires constant re-education. What no one tells you: managing your company's cyber vulnerability demands a willingness for personal vulnerability. Being honest about our cyber risks is painful. And scary.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- ITC General Exclusion Orders Targeting All Importers Are On the RiseIn recent years, the ITC has issued more General Exclusion Orders (GEOs) than in the past. For importers of products potentially implicated by a requested GEO, the GEO can be a major threat even if the importer is not a respondent in the case.Read More ›
- The Roadmap of Litigation AnalyticsLitigation analytics can be considered a roadmap of sorts — an important guide to ensure the legal professional arrives at the correct litigation strategy or business plan. However, like roadmaps, litigation analytics will only be useful if it's based on data that is complete and accurate.Read More ›
