By C. Ryan Barber | June 6, 2018
"The cease and desist order contains no prohibitions. It does not instruct LabMD to stop committing a specific act or practice. Rather, it commands LabMD to overhaul and replace its data-security program to meet an indeterminable standard of reasonableness. This command is unenforceable,” the appeals court said.
By Roy Strom | June 4, 2018
Polsinelli has added nearly 30 partners this year. Two of the latest lateral hires will lead the firm's privacy and cybersecurity practice.
New York Law Journal | Expert Opinion
By Angela Turturro | June 4, 2018
In this Special Report: "The Biometric Standards: How New York Measures Up in the Face of Biometric Use Regulations," "The Con of Social Engineering: Law Firms are Easy Prey," "The Future of Cyber Threats: When Attacks Cause Physical Harm," "When the FBI Can Help Companies Deal With a Cyber Event" and "Challenges of a National 72-Hour Data Breach Notification Standard."
By Gabrielle Orum Hernández | June 4, 2018
The newly appointed Penn State professor sees a lot of room for questions in the evolving cyber law landscape, but so far there are few answers.
By Todd Friedman, Kenny Nachwalter; and Justin Wales, Carlton Fields | June 4, 2018
Public access prevailed in the Eleventh Circuit's recent Leidel v. Coinbase decision, which provides insight for how aggrieved investors may be able to draft pleadings against third-party money service providers.
New York Law Journal | Analysis
By Avi Gesser and Joseph Kniaz | June 1, 2018
Many companies neglect to reach out to the FBI following a cyber incident, turning instead to law firms and cybersecurity firms alone. This might be a mistake considering the practical assistance the FBI can provide to targets of a cyber attack.
New York Law Journal | Expert Opinion
By Nicole Friedlander, Corey Omer and John Evangelakos | June 1, 2018
Facebook CEO Mark Zuckerberg testified before Congress last month regarding Cambridge Analytica's unauthorized use of data of an estimated 87 million…
By By Anna Rudawski, Alexis Wilpon and David Kessler | June 1, 2018
The ability of cyber threats to compromise information systems is an ongoing danger to all organizations. However, an emerging threat presents a new challenge—cyberattacks that may cause physical harm to systems and persons. This threat has become acute for certain sectors such as critical infrastructure.
By John T. Wolak, Mitchell Boyarsky, and Randy A. Gray | June 1, 2018
Although New York has yet to enact legislation regarding the use of biometric identifiers and information (i.e. facial recognition, retinal scans, etc.), a recent legislative proposal and the statutes and regulations of other jurisdictions, provide valuable guidance to New York businesses regarding permissible practices.
By Mark A. Berman, Ronald J. Hedges, and Kennet Westby | June 1, 2018
A discussion of the threat that social engineering (aka the "human side of hacking") poses to law firms, and some tips and practical guidelines to reduce its effectiveness.
Presented by BigVoodoo
Consulting Magazine identifies the best firms to work for in the consulting profession.
Join General Counsel and Senior Legal Leaders at the Premier Forum Designed For and by General Counsel from Fortune 1000 Companies
Women, Influence & Power in Law Awards honors women lawyers who have made a remarkable difference in the legal profession.
The New Jersey Law Revision Commission, an independent legislative commission (N.J.S. 1:12A-1 et seq.), seeks a NJ-licensed atty in good sta...
The Federal Election Commission (FEC) is looking for a passionate and dedicated individual with extensive litigation experience as well as o...
We are seeking an attorney with a minimum of four years of experience in transactional work to join our well-established, nationally renowne...