Our caseloads and court dockets attest: bad things happen the eve of an employee departure. A sales manager emails himself customer, pricing or personnel information. A physician fills her thumb drive with the practice group’s patient list and billing information. A medical assistant forges patient checks or charges personal expenses to patient credit cards. A loan officer (and embezzler) decides to run and takes a bank laptop. Our client is hot. We call the police. We rush to interview staff and review our client’s contracts, to draft and file injunction papers. Yet, while we scramble to stem the loss of trade secrets and competitive information, another risk demands our attention: data breach.
By now we, and hopefully our clients, have been appropriately sensitized to the horrors that attend poor cybersecurity. Malware, spyware and ransomware can disrupt and infiltrate systems by way of hacking, social engineering, spoofing, phishing, vishing, watering holes and cyber fraud by any other name. These in turn result in data breaches, identity theft, stolen IP, extortion, threats to public safety, as well as destruction of property, reputation and goodwill.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.
For questions call 1-877-256-2472 or contact us at [email protected]