Latest Publications

Share:

China Issues Its First Network Security Law

The Standing Committee of the National People’s Congress of the People’s Republic of China (PRC) has introduced China’s first and comprehensive Network Security Law (also referred to as Cybersecurity Law). The law will have...more

China Issues Its First Network Security Law

The law will have far-reaching implications for parties that utilize the Internet and handle network data and personal information in the PRC. On November 7, 2016, the Standing Committee of the National People’s Congress...more

Prevent and Prepare for a Cybersecurity Breach

Hacking of organizations’ systems is becoming increasingly commonplace, even with advancements in security practices. To mitigate risk, a company must have an enterprise-level, cross-functional incident response plan that is...more

Mitigating Cybersecurity Risks

Hacking of organisations’ systems is becoming increasingly commonplace, even with advancements in security practices. To mitigate risk, a company must have an enterprise-level, cross-functional incident response plan that is...more

5 Preventative Steps to Manage Legal Risk Following a Cybersecurity Breach

Preparing for and rehearsing how to respond to a breach is as important as improving security systems and protocols. Hacking of organizations’ systems is becoming increasingly commonplace, even with advancements in...more

Bitcoin Again Held to Be “Funds” for Federal Money Transmitting Purposes

Murgio decision reflects a growing judicial consensus around the application of money transmitting laws to Bitcoin exchangers. On September 19, 2016, U.S. District Judge Alison J. Nathan of the Southern District of New...more

Virtual Currencies: Court Rules that Selling Bitcoin Is Not Money Transmitting and Selling Bitcoin to Criminals Is Not a Crime

The ruling is an outlier driven by its unique facts and is unlikely to change the general regulatory landscape for Bitcoin businesses. In State of Florida v. Espinoza, a trial court in Miami recently dismissed all...more

“Hacking” Warrants: A Question of Procedure or Substance?

Typically, the process for amending the Federal Rules of Criminal Procedure is a sleepy affair. Proposed amendments wend their way through a series of judicial committees and, if approved by the Supreme Court, take effect...more

Are Changes in Store for the Stored Communications Act?

Last week saw action on two fronts regarding the Stored Communications Act (SCA) – the US federal statute regulating government searches of online accounts in criminal investigations. In Congress, a proposal to reform the SCA...more

34 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide