New Research: Employee Privacy and Corporate Legal Risk
June 02, 2017
The use of business email accounts and digital devices for personal communications can be risky for both employers and employees. However, employees of all levels may be commingling corporate communications with their personal information, according to new research.
<b><i>Online Extra</b></i><br>Facebook Fine Could Slow Future EU Launches
June 02, 2017
Facebook Inc. received one of its biggest regulatory slaps late last month when European antitrust regulators fined it $122 million for providing misleading statements about its 2014 purchase of WhatsApp. The fine is relatively small compared to Facebook's annual profits, but it does signal a more aggressive regulatory environment in the region.
Federal and State Cybersecurity Regulation of Financial Services Firms
June 02, 2017
Two states recently enacted or proposed rules for financial services firms. This may be just the beginning of a national trend toward increased state regulation of cybersecurity matters. Financial services firms and their management should be prepared to proactively address the shifting regulatory landscape as it continues to evolve.
The State of Data Breach Litigation and How to Avoid It
May 02, 2017
The number of records compromised in data breaches in 2016 increased an astounding 86% over 2015 breaches. This has led to numerous data breach litigations in the civil and regulatory context. What are the major cases and trends from 2016? And what can organizations do to try to reduce their risks of breaches and litigations?
State of the Industry: E-Discovery and Cybersecurity
May 02, 2017
<b><i>Part Two of a Three-Part Article</b></i><p>Examining the current similarities between e-discovery and cybersecurity and details how the history of e-discovery mirrors the present of cybersecurity and is a predictor of future patterns in the cybersecurity staffing market.
Using Computer Forensics to Investigate Employee Data Theft
May 02, 2017
Departing employees have a sense of ownership over the data that they copy. Intellectual property commonly stolen includes customer lists, secret formulas, source code, strategy documents and other trade secrets. The information is often used against the organization when the former employee goes to work for a competitor or decides to start a new company.
The Challenge of Complying with China's New Cybersecurity Law
May 02, 2017
In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. The law is set to go into effect June 1, 2017. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.
The Challenge of Complying with China's New Cybersecurity Law
May 02, 2017
In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. The law is set to go into effect June 1, 2017. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.