Cybersecurity and Privacy

Justice Mariano-Florentino Cuellar, California Supreme Court

What Worries a Calif. Supreme Court Justice About AI and the Law?

By Ben Hancock |

Justice Mariano-Florentino Cuéllar isn't afraid of the robot uprising. But when is reliance on AI arbitrary and capricious? That's a heavy question.

Verizon headquarters

Vendor Breached Your Company Data? Sorry, You're Still Liable

By Rhys Dipshan |

The liabilities companies face due to vendor cybersecurity incidents can vary widely depending on the particular situation and the actions they take beforehand.

How WordPress Takes On the Challenges of Protecting User Data

By Jennifer Williams-Alvarez |

Paul Sieminski, Automattic's GC, said that the Snowden leaks significantly changed the data privacy and government requests landscape.

The IGP and CFSR: Transitioning Your E-Discovery Career Into a Cybersecurity One

By Jared Coseglia, TRU Staffing Partners |

The second part of this look at cybersecurity education and certifications explores two certifications that touch on both cybersecurity and e-discovery: the IGP and CFSR.

Federal Trade Commission

GM's Top Cyber Official Warns FTC Not to Repeat History

By C. Ryan Barber |

While their life-saving potential is clear, connected cars raise significant cybersecurity concerns. Jeff Massimilla addressed those concerns at an FTC and NHTSA conference.

Data Breach.

DLA Piper Hit by Cyber Attack, Phones and Computers Down Across the Firm

By James Booth |

The shutdown appears to have been caused by a ransomware attack, similar to the WannaCry attack that hit organizations such as the NHS last month.

Winning? US Is Top in Corporate Data Breach Costs Thanks to Legal

By Rhys Dipshan |

An IBM and Ponemon Institute study found indirect costs such as litigation make the United States the most expensive country for corporations to suffer a data breach.

Businessman hand holding money banknote for paying the key from hacker for unlock folder got ransomware malware virus computer. Vector illustration technology data privacy and security concept.

Taking Stock of Ransomware: What It Is, and Why You Should Care

By Gabrielle Orum Hernández |

A Legalweek West panel offered quick solutions to mitigate the ransomware dilemma and explored the 'should I pay' question.

3 Realities of Modern Cybersecurity

By Rhys Dipshan |

The new era of data protection and regulation is far from fool proof, but more realistic and comprehensive than ever before.

'A Great Target for Cyber-crime': WannaCry Attacks Push Firm Tech Security Up the Agenda

By Alex Berry |

With cyber-attacks continuing to make headlines, partners and IT security experts discuss the implications for law firms.

Maneuvering the Madness of Cyber and ESI Education & Certification

By Jared Coseglia, TRU Staffing Partners |

Step one: Get the basics quickly, and stay ahead of the curve professionally.

Andrew P. Gold and Dee Dee Fischer, with Akerman.

'Shared' Password Leads to $3.73M Verdict Against Florida Company

By Celia Ampel |

A jury found Compass iTech had misappropriated trade secrets, interfered with a contract and breached the terms of service of an analytics company.

Judge OKs $10M Target Data Breach Settlement—Again

By Amanda Bronstad |

U.S. District Judge Paul Magnuson came out with an order approving class certification in a $10 million data-breach settlement.

For Staffing, the History of E-Discovery Mirrors the Present of Cybersecurity

By Jared Coseglia, TRU Staffing Partners, Cybersecurity Law & Strategy |

Examining the current similarities between e-discovery and cybersecurity can be a predictor of future patterns in the cybersecurity staffing market.

NHS website affected by international computer cyber attack Ransomware cyber attack, London May 13 2017 (Rex Features via AP Images)

The WannaCry Attack: A Wake-up Call for Organizational Information Governance?

By Ian Lopez |

The sort of ransomware attack experts have warned about for years has happened. Now organizations need to examine their security postures.

Making Sense of New Data Types in the App Age

By Tim Anderson and JR Jenkins, Law Journal Newsletters |

While the threat of "big data" — massive amounts of data inside an organization — has cast a shadow over IT and legal departments for several years, the real challenge can oftentimes be the variety. It's why we believe the real challenge is less about "big data" and more about "new data types" — that quickly defeat traditional collection and review tools and strategies.

Considering Cyberinsurance? Here’s What You Need to Know

By Judy Selby, BDO Consulting |

A rundown of what potential buyers need to know when thinking about purchasing cyberinsurance.

Planning for the Worst: White House Guidance on Avoiding, and Coping With, Data Breaches

By Kristen Price, Haight Brown & Bonesteel |

The White House memo reflects changing laws and policies and provides guidance for how organizations should tailor their response plans.

Integris Looks to Help Companies Manage 'Live Maps' of Sensitive Data

By Gabrielle Orum Hernández |

Founder Kristina Bergman hopes to bring dynamic data mapping to information governance.

Colorado Latest State to Propose Cybersecurity Compliance Rules

By Ed Silverstein |

The rules for broker-dealers and investment advisers are directed at 'ensuring that each entity has baseline data security procedures in place that are commensurate with its size.'

Julie Brill

Microsoft Hires Ex-FTC Commissioner as Cybersecurity, Privacy Lead

By David Ruiz |

Julie Brill joins the company after roughly a year with Hogan Lovells, where she served as co-director of the firm’s privacy and cybersecurity practice.

J.C. Boggs, King & Spalding, Partner and Dean C. Garfield, Information Technology Industry Council, President and CEO opened the 2017 Cybersecurity & Privacy Summit, hosted by King & Spalding on April 24, 2017.

Cyberinsurance and Vendor Follies Headline King & Spalding Cybersecurity Summit

By Gabrielle Orum Hernández |

Panelists hoped to bring clarity to risk management anxieties arising from the fast-changing cybersecurity market.

Will 'Draft Measures' Help Clarify Data Transfer Issues in China?

By Ed Silverstein |

The Chinese government says the data transfer Draft Measure clarifies the recently passed Cybersecurity Law, but companies may find some of the regulations potentially cumbersome.

Wolters Kluwer Aiming to Streamline Research into the Cybersecurity ‘Haystack’

By Zach Warren |

The new Cybersecurity & Privacy Law Suite provides curated news and enhanced searching capabilities for security-minded corporate legal professionals.

Information Governance: Law Firms' Cybersecurity Weak Spot

By Ian Raine, Cybersecurity Law & Strategy |

Perimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.

Ex-New Jersey Judge, Colleagues Lose Bid to Dismiss Computer Hacking Suit

By Charles Toutant |

Former Essex County Superior Court Judge Carol Ferentz, Benjamin DelVento and DelVento's sons Benjamin Jr. and Matthew had moved to dismiss the suit by Maurice Donovan.

Aaron Tantleff, left, and Mark Krotoski, right.

Two Lawyers’ Forecast for Cybersecurity Regulations? Cloudy

By Joel Stashenko |

The lawyers discuss regulatory conflicts that may emerge between federal agencies and states as they grab pieces of cybercrime deterrence.

Preparing for Ransomware Attacks: Your Company Is a Target

By Ryan Bergsieker and Allison Chapin, Gibson Dunn |

Planning ahead is essential, and legal teams should consider these nine tips when assessing their companies' readiness.

legal computer judge concept, lady justice isolated on white, 3D illustration.

Getting Serious About Document Security Means Balancing Access and Productivity

By Tracie Sokol, Canon U.S.A |

The need for workflow security components goes much deeper than simply meeting compliance requirements.

Hacker Tries Extortion Plot vs. Apple, but Co. Says it Is Not Harmed; Here's What To Do

By Sue Reisinger |

While Apple says users are safe, the event underscores the importance for companies to be prepared for cyber events, says Alston & Bird partner.

Yahoo, Verizon Debacle Shines Light on M&A Cybersecurity

By Ed Silverstein |

These days, cybersecurity is 'a meaningful issue in almost every modern day M&A transaction,' said King & Spalding's Robert Leclerc.

5 Key Cyber Trends Dominating the Early 2017 Discourse

By Jason Straight, UnitedLex |

These talked-about trends span not only the progress made, but also the cybersecurity challenges that still lie ahead.

Counsel Face Major Challenges with Rise of the Internet of Things

By Rhys Dipshan |

In addition to heeding ever-changing regulations over Internet of Things devices, counsel must reckon with novel security and discovery burdens.

Legal Tech 'Crosses the Pond' In Spite of Brexit Vote

By Gabrielle Orum Hernández |

Despite uncertainty around last year's Brexit vote, legal technology companies continue to push operations into the U.K. market.

Law Firm Dodges Class Claims in First-of-Its-Kind Data Security Case

By Roy Strom |

Claims against Chicago-based Johnson & Bell for allegedly failing to protect client information must be heard individually in arbitration.

What Companies Need to Know About California Privacy Risk Mitigation

By Lothar Determann, Baker & McKenzie |

Companies should implement a privacy compliance program (or add California privacy law considerations to an existing program). Here's what they should entail.

John T. Araneo, General Counsel of Align.

The Evolution of a Cyber Lawyer: LTN Talks With Align's John Araneo

By Rhys Dipshan |

Araneo discusses his path to becoming cybersecurity counsel at Align, and what general counsel across the corporate world are underestimating about modern-day threats.

4 Key Legal Operations Lessons from This Year's LDO Survey

By Brad Blickstein, The Blickstein Group |

This year's survey sees shifts in e-discovery handling, metrics use and more.

FTC Commissioner Terrell McSweeny.

The Internet of Things: Transformative for Industry, Major Headache for Privacy

By Ian Lopez |

The FTC and Big Law weighed in on the ups and downs of IoT for security, privacy and consumers at New York Law School.

The 'Soft Underbelly' of Cybersecurity Meets Legal Ethics

By Jerry Cohen, JAMS |

By following certain best practices and structures, lawyers and law firms can meet ethical standards for protecting client data.

Flight-Check Your Cloud Tech: 7 Security Questions to Ask Your Vendor

By Lisa Hawke, Everlaw |

With suitable care and the proper questions, you should be able to keep your law firm out of the data breach headlines.