Cybersecurity and Privacy

Andrew P. Gold and Dee Dee Fischer, with Akerman.

'Shared' Password Leads to $3.73M Verdict Against Florida Company

By Celia Ampel |

A jury found Compass iTech had misappropriated trade secrets, interfered with a contract and breached the terms of service of an analytics company.

Judge OKs $10M Target Data Breach Settlement—Again

By Amanda Bronstad |

U.S. District Judge Paul Magnuson came out with an order approving class certification in a $10 million data-breach settlement.

For Staffing, the History of E-Discovery Mirrors the Present of Cybersecurity

By Jared Coseglia, TRU Staffing Partners, Cybersecurity Law & Strategy |

Examining the current similarities between e-discovery and cybersecurity can be a predictor of future patterns in the cybersecurity staffing market.

NHS website affected by international computer cyber attack Ransomware cyber attack, London May 13 2017 (Rex Features via AP Images)

The WannaCry Attack: A Wake-up Call for Organizational Information Governance?

By Ian Lopez |

The sort of ransomware attack experts have warned about for years has happened. Now organizations need to examine their security postures.

Making Sense of New Data Types in the App Age

By Tim Anderson and JR Jenkins, Law Journal Newsletters |

While the threat of "big data" — massive amounts of data inside an organization — has cast a shadow over IT and legal departments for several years, the real challenge can oftentimes be the variety. It's why we believe the real challenge is less about "big data" and more about "new data types" — that quickly defeat traditional collection and review tools and strategies.

Considering Cyberinsurance? Here’s What You Need to Know

By Judy Selby, BDO Consulting |

A rundown of what potential buyers need to know when thinking about purchasing cyberinsurance.

Planning for the Worst: White House Guidance on Avoiding, and Coping With, Data Breaches

By Kristen Price, Haight Brown & Bonesteel |

The White House memo reflects changing laws and policies and provides guidance for how organizations should tailor their response plans.

Integris Looks to Help Companies Manage 'Live Maps' of Sensitive Data

By Gabrielle Orum Hernández |

Founder Kristina Bergman hopes to bring dynamic data mapping to information governance.

Colorado Latest State to Propose Cybersecurity Compliance Rules

By Ed Silverstein |

The rules for broker-dealers and investment advisers are directed at 'ensuring that each entity has baseline data security procedures in place that are commensurate with its size.'

Julie Brill

Microsoft Hires Ex-FTC Commissioner as Cybersecurity, Privacy Lead

By David Ruiz |

Julie Brill joins the company after roughly a year with Hogan Lovells, where she served as co-director of the firm’s privacy and cybersecurity practice.

J.C. Boggs, King & Spalding, Partner and Dean C. Garfield, Information Technology Industry Council, President and CEO opened the 2017 Cybersecurity & Privacy Summit, hosted by King & Spalding on April 24, 2017.

Cyberinsurance and Vendor Follies Headline King & Spalding Cybersecurity Summit

By Gabrielle Orum Hernández |

Panelists hoped to bring clarity to risk management anxieties arising from the fast-changing cybersecurity market.

Will 'Draft Measures' Help Clarify Data Transfer Issues in China?

By Ed Silverstein |

The Chinese government says the data transfer Draft Measure clarifies the recently passed Cybersecurity Law, but companies may find some of the regulations potentially cumbersome.

Wolters Kluwer Aiming to Streamline Research into the Cybersecurity ‘Haystack’

By Zach Warren |

The new Cybersecurity & Privacy Law Suite provides curated news and enhanced searching capabilities for security-minded corporate legal professionals.

Information Governance: Law Firms' Cybersecurity Weak Spot

By Ian Raine, Cybersecurity Law & Strategy |

Perimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.

Ex-New Jersey Judge, Colleagues Lose Bid to Dismiss Computer Hacking Suit

By Charles Toutant |

Former Essex County Superior Court Judge Carol Ferentz, Benjamin DelVento and DelVento's sons Benjamin Jr. and Matthew had moved to dismiss the suit by Maurice Donovan.

Aaron Tantleff, left, and Mark Krotoski, right.

Two Lawyers’ Forecast for Cybersecurity Regulations? Cloudy

By Joel Stashenko |

The lawyers discuss regulatory conflicts that may emerge between federal agencies and states as they grab pieces of cybercrime deterrence.

Preparing for Ransomware Attacks: Your Company Is a Target

By Ryan Bergsieker and Allison Chapin, Gibson Dunn |

Planning ahead is essential, and legal teams should consider these nine tips when assessing their companies' readiness.

legal computer judge concept, lady justice isolated on white, 3D illustration.

Getting Serious About Document Security Means Balancing Access and Productivity

By Tracie Sokol, Canon U.S.A |

The need for workflow security components goes much deeper than simply meeting compliance requirements.

Hacker Tries Extortion Plot vs. Apple, but Co. Says it Is Not Harmed; Here's What To Do

By Sue Reisinger |

While Apple says users are safe, the event underscores the importance for companies to be prepared for cyber events, says Alston & Bird partner.

Yahoo, Verizon Debacle Shines Light on M&A Cybersecurity

By Ed Silverstein |

These days, cybersecurity is 'a meaningful issue in almost every modern day M&A transaction,' said King & Spalding's Robert Leclerc.

5 Key Cyber Trends Dominating the Early 2017 Discourse

By Jason Straight, UnitedLex |

These talked-about trends span not only the progress made, but also the cybersecurity challenges that still lie ahead.

Counsel Face Major Challenges with Rise of the Internet of Things

By Rhys Dipshan |

In addition to heeding ever-changing regulations over Internet of Things devices, counsel must reckon with novel security and discovery burdens.

Legal Tech 'Crosses the Pond' In Spite of Brexit Vote

By Gabrielle Orum Hernández |

Despite uncertainty around last year's Brexit vote, legal technology companies continue to push operations into the U.K. market.

Law Firm Dodges Class Claims in First-of-Its-Kind Data Security Case

By Roy Strom |

Claims against Chicago-based Johnson & Bell for allegedly failing to protect client information must be heard individually in arbitration.

What Companies Need to Know About California Privacy Risk Mitigation

By Lothar Determann, Baker & McKenzie |

Companies should implement a privacy compliance program (or add California privacy law considerations to an existing program). Here's what they should entail.

John T. Araneo, General Counsel of Align.

The Evolution of a Cyber Lawyer: LTN Talks With Align's John Araneo

By Rhys Dipshan |

Araneo discusses his path to becoming cybersecurity counsel at Align, and what general counsel across the corporate world are underestimating about modern-day threats.

4 Key Legal Operations Lessons from This Year's LDO Survey

By Brad Blickstein, The Blickstein Group |

This year's survey sees shifts in e-discovery handling, metrics use and more.

FTC Commissioner Terrell McSweeny.

The Internet of Things: Transformative for Industry, Major Headache for Privacy

By Ian Lopez |

The FTC and Big Law weighed in on the ups and downs of IoT for security, privacy and consumers at New York Law School.

The 'Soft Underbelly' of Cybersecurity Meets Legal Ethics

By Jerry Cohen, JAMS |

By following certain best practices and structures, lawyers and law firms can meet ethical standards for protecting client data.

Flight-Check Your Cloud Tech: 7 Security Questions to Ask Your Vendor

By Lisa Hawke, Everlaw |

With suitable care and the proper questions, you should be able to keep your law firm out of the data breach headlines.

Illustration by Val Bochkov

In Corporate Cyber-risk Planning, Legal Takes the Helm

By Ricci Dipshan |

A Legalweek panel explores practical approaches to security incident planning, and legal's pivotal role.

3 Risks (and Solutions) for Document Security in 2017

By Dean Sappey, DocsCorp |

Organizations have focused on securing the storage of documents, but little attention is paid to access and distribution of documents.

Inside the Federal Government's Latest Guidance on IoT Security

By Hanley Chew, Fenwick & West |

Companies need to be mindful of November guidance from DHS and NIST.

cybersecurity

Hackers, Data Leaks, Encryption and Hidden Data Can Wreak E-Discovery Havoc

By Adam Feinberg, BIA |

As we enter 2017, here's how changes in cybersecurity may affect your e-discovery plans moving forward.

Andrew M. Cuomo

New York Governor Cuomo Promises New Cybersecurity Measures in 2017

By Joel Stashenko |

Among the measures is forming a "response team" when confidential information from state and local governments is breached.

Ashley Madison website.

Ashley Madison Data Breach Claims Should Be Arbitrated, Company Says

By Amanda Bronstad |

The plaintiffs counter Avid’s “shoddy record-keeping practices” made it difficult to know whether the plaintiffs signed arbitration agreements.

New FTC Contest Confronts 'Internet of Things' Security

By Marcia Coyle |

The agency has announced the latest in a series of cash-reward contests for solutions to protect personal data.

New York Delays Implementation of Cybersecurity Mandate by Two Months

By Joel Stashenko, New York Law Journal |

5 Cybersecurity Challenges for Enterprises in 2017

By Liisa Thomas, Winston and Strawn |

Winston and Strawn partner Liisa Thomas lays out a roadmap on challenges to face companies in the coming year.

Preet Bharara

Chinese Nationals Charged With Hacking Firms to Steal M&A Info

By Mark Hamblett, The Am Law Daily |

No Time to Waste: U.S. Companies Will Face European, Homegrown Privacy and Security Challenges in 2017

By Donald G. Aplin, Bloomberg Law |

A look at the GDPR “tidal wave,” FTC authority clarification and more security and privacy challenges to watch for next year.

Computer Hacking

Is 2017 the Year a Leak Sinks Your Firm?

By Dan Bressler, Intapp |

A look into the future for the lessons learned from the “hack” of one major firm.

GCs Are Questioning Their Outside Counsel About Cybersecurity

By Jennifer Williams-Alvarez |

The Johnson & Bell suit is a good reminder of the importance of questioning outside firms about their cybersecurity efforts.

Cloud computing.

6 Often-Overlooked Cloud Security Considerations

By William Kellermann, Hanson Bridgett |

A look at some less obvious but important considerations related to cloud security and why they are often overlooked.

Drone-Jacking and Other Threats: Cyber Veteran Alan Wernick on 2017's Security Landscape

By Ricci Dipshan |

While Wernick sees a more-complicated landscape for cybersecurity and drone issues, he also cites opportunities for developing technology and collaborating against cyberthreats.

concept of leaky software, data with a tap sticking out.

3 Key Cybersecurity Concerns for Department Operations Staff

By Brad Blickstein |

More than three-quarters of law departments are responsible for or meaningfully influence their companies' cybersecurity. Here's what to watch for.

Data Privacy Laws and Blocking Statutes: Practical Strategies for Counsel

By Ashish Prasad and Patrick Oot |

Data privacy laws and blocking statutes can seriously impact investigations and litigation that reach outside of U.S. borders.

Privacy and Data Security Top List of Questions for Legal Experts About Drones

By Gabrielle Orum Hernández |

Uncertainty continues for legal experts and policymakers around issues of privacy and data security raised by the influx of drones circling the skies.

Business Demands Overshadow Cybersecurity Needs at Law Firms, Survey Finds

By Ricci Dipshan |

As firms focus on meeting efficiency demands, experts advise looking at cybersecurity as a business risk.