By Craig Nazzaro, Dowse Bradwell “Brad” Rustin, IV, and John M. Jennings, Nelson Mullins Riley & Scarborough | January 8, 2018
Blockchain's operational efficiencies and cost savings are equally coveted by the entities trying to implement them and by the customers who will benefit. However, neither party can fully enjoy the benefits without first understanding the various regulatory hurdles.
By Paige Boshell, Bradley Arant Boult Cummings | January 5, 2018
In the coming months, there will be a great deal of information and regulatory and judicial action that will act as guidance, or more precisely, a checklist of what-not-to-do, for companies that suffer a data breach.
By David Kalat, Berkeley Research Group | December 20, 2017
We have widely agreed-upon cultural norms guiding the appropriate level of protection for physical assets, but do not yet have the same protective instinct for assets in the digital realm.
By Sonia Cheng, Eckhard Herych and Richard MacDonald | December 19, 2017
Many corporations around the globe are preparing for May 2018, when Europe's GDPR enforcement kicks in. The regulation encompasses a wide range of nuanced privacy requirements that can be challenging to operationalize.
By Gabrielle Orum Hernández | December 14, 2017
After a year of high profile data breaches, in-house counsel are bracing for another year of cybersecurity frustrations and scrutiny.
Legaltech News | Profile|Analysis
By Rhys Dipshan | December 11, 2017
Tackling some of the newest and most perilous legal risks, these law firms are defining and protecting life in the information age.
By Ian Lopez | December 4, 2017
At CyberSecure 2017, the New York attorney general's tech bureau chief discussed changing norms around breach notification efforts.
By Ed Silverstein | December 4, 2017
Social Security numbers are now used as a proxy for an identifier by many businesses, but recent breaches have revealed their downsides.
By Ed Silverstein | December 4, 2017
One recent issue involves Google's collection of data from iPhone users, and another involves police surveillance powers.
By Tim Sheehan, Innovative Computing Systems | December 1, 2017
Have a worry-free holiday when it comes to your mobile devices by following these five security steps.
Presented by BigVoodoo
Join the industry's top owners, investors, developers, brokers & financiers at THE MULTIFAMILY EVENT OF THE YEAR!
Law.com celebrates the California law firms and legal departments driving the state's dynamic legal landscape.
The Texas Lawyer honors attorneys and judges who have made a remarkable difference in the legal profession in Texas.
When you come to work for New Jersey Judiciary you will join an 8500-member strong TEAM that operates with the highest standards of independ...
When you come to work for New Jersey Judiciary you will join an 8500-member strong team that operates with the highest standards of independ...
CAREER OPPORTUNITYUNITED STATES DISTRICT COURT DISTRICT OF CONNECTICUT VACANCY ANNOUNCEMENT - USDC-CT 24-14 POSITION: Pro Se Law Clerk OPENI...