In today’s digital age, cybersecurity has become a paramount concern for executives navigating the complexities of their corporate ecosystems. With resources often limited and the ever-present threat of cyberattacks,...more
AI has great capability to both harm and to protect in a cybersecurity context. As with the development of any new technology, the benefits provided through correct and successful use of AI are inevitably coupled with the...more
Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more
10/12/2023
/ Crisis Management ,
Cyber Attacks ,
Cyber Insurance ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Events ,
Incident Response Plans ,
Risk Mitigation
2023 is shaping up to be a landmark year for data privacy, as comprehensive consumer privacy laws take effect in four states and a fifth state expands its already robust privacy compliance requirements. As part of Womble Bond...more
In the past 5 years businesses felt the increasingly intricate data management rules (GDPR, CCPA, BIPA) pressed against an explosion in hacking and ransomware. Companies experience pressure from legislators, regulators,...more
3/15/2022
/ Biometric Information ,
Continuing Legal Education ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Management ,
Data Privacy ,
Data Protection ,
Data Security ,
Data Use Policies ,
Geolocation ,
Hackers ,
New Legislation ,
Privacy Laws ,
Ransomware ,
State Privacy Laws ,
Webinars
In the before-times – the heady days of 2017 when the prices of both Bitcoin and Ethereum skyrocketed and seemed immune to gravity – several well-known companies boosted their value by claiming to build new products on the...more
In meetings with data security professionals, the same topic tends to arise: Why are we fighting the same security battles now that we fought 20 years ago?
The history of network and cyber security seems to be a...more
Within a corporation, teams jockey for resources and promote their roles within the enterprise. It sometimes seems like important parts of the company are working at cross-purposes....more
Our personal technology is so complex that making a change in one aspect is likely to affect us in many ways. When tech companies step into social issues, we are likely to see unintended consequences....more
8/11/2021
/ Apple ,
Child Abuse ,
Child Protection Laws ,
Communications Decency Act ,
Data Privacy ,
Data Security ,
Electronic Devices ,
Encryption ,
FOSTA ,
iPhone ,
Minor Children ,
Photographs ,
Privacy Concerns ,
Safe Harbors ,
Sex Trafficking ,
Sexual Abuse ,
Technology Sector ,
Vulnerable Victims
We always suspected that the Amazon Echo resting quietly in your family room was more insidious than it seemed. Now we have confirmation. We know that the Echo can hear us. We also know that it records private conversations...more
6/23/2021
/ ALEXA ,
Amazon Echo ,
Amazon Marketplace ,
Connected Items ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Internet of Things ,
Oral Communications ,
Personal Assistants ,
Privacy Concerns ,
Security Systems ,
Wifi
The recent spate of apparently eastern European cyberattacks on important U.S. commercial interests—from SolarWinds to Colonial Pipeline—should force all of us to step back and review how we organize our world. Many crucial...more
There is a reason we don’t all have a definitive digital identifier.
I am describing a digital ID to be used by everybody for everything we do online – any bank would know you anywhere and know what funds it could give...more
Your body may be a wonderland or a wasteland, but it is a goldmine of data. Collectors of information have noticed.
In our midwinter exploration of the economic and legal foundations of data regulation, we next turn to a...more
Meet the Euro-crats who think that the European Union needs to behave more like Russia and China.
More like Nigeria, Kazakhstan, and Indonesia.
These leaders are pushing not just to punish U.S. firms for successfully...more
How is a refrigerator like a stoplight camera and a delivery drone?
Each of these devices and hundreds of millions of others are part of the internet of things (IoT), meaning that manufacturers are building them with sensors...more
Definitions are important.
How we define words sets the context for how we regulate them. In the U.S., the definitions of legally defended private information are changing, affecting the entire scope of information...more
The Federal Trade Commission (“FTC”) conducted an investigation into Zoom Video Communications, Inc.’s (“Zoom”) privacy and security practices and announced a settlement agreement on November 9, 2020. As a part of the...more
We all have them. Old computers sitting around in storage, never to be used again. Broken servers that have passed their prime. Laptops abandoned for their newer, shinier versions.
And what do you do with them? If these...more
10/14/2020
/ Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
Electronics ,
Environmental Policies ,
Laptop Computers ,
Morgan Stanley ,
NIST ,
OCC ,
Recycling ,
Waste Disposal ,
Work Computer
Historians believe we have started a fourth industrial revolution where physical, digital, and biological worlds will merge to form the basis of a new economy. One of the key elements of this transformation is the emergence...more
Most people have a warped and deeply unrealistic understanding of data security.
There is no such thing as absolute security. For a thing to have value, you must be able to access the value – in effect, to use it. In order...more
Last week, the New York State Senate, at the request of the state attorney general, passed the “Stop Hacks and Improve Electronic Data Security Act” (the “Shield” Act). The bill is currently working its way through the New...more
Now a business that was hacked may be successfully sued under state common law by data subjects whose information was compromised in the crime. For the first time, a state supreme court has held that a company that was...more
1/3/2019
/ Breach of Duty ,
Cybersecurity ,
Data Breach ,
Data Security ,
Economic Loss Doctrine ,
Employer Liability Issues ,
Negligence ,
PA Supreme Court ,
Personally Identifiable Information ,
Popular ,
Reasonable Care
The new California Consumer Privacy Act is not the only California privacy law that companies will have to prepare for in 2019. Beginning on January 1, 2020, California will also require a manufacturer of a “connected device”...more
10/10/2018
/ California Consumer Privacy Act (CCPA) ,
Connected Items ,
Data Collection ,
Data Security ,
Governor Brown ,
Internet ,
Internet of Things ,
Manufacturers ,
New Legislation ,
Private Right of Action ,
Smart Devices ,
Software
“New threats and a new era of strategic competition” have prompted the White House to roll out a new National Cyber Strategy. As identified below, the Strategy contains important priority initiatives that will advantage many...more
9/28/2018
/ Critical Infrastructure Sectors ,
Cyber Crimes ,
Cybersecurity ,
Data Security ,
National Security ,
Popular ,
Private Sector ,
Risk Mitigation ,
Technology Sector ,
Telecommunications ,
Transportation Industry
You may be paying for cyber insurance that will not cover the most significant cyber risks faced by your business.
Recent studies call into question whether a company can insure against the unprecedented huge fines for...more
9/20/2018
/ Corporate Counsel ,
Cyber Insurance ,
Cybersecurity ,
Data Protection ,
Data Security ,
EU ,
Extraterritoriality Rules ,
Fines ,
General Data Protection Regulation (GDPR) ,
Member State ,
Popular