No Password Required: USF Cybercrime Professor, Former Federal Agent, and Vintage Computer Archivist
Episode 334 -- District Court Dismisses Bulk of SEC Claims Against Solarwinds
Monumental Win in Data Breach Class Action: A Case Study — The Consumer Finance Podcast
Cost of Noncompliance: More Than Just Fines
Will the U.S. Have a GDPR? With Rachael Ormiston of Osano
Work This Way: A Labor & Employment Law Podcast | Episode 14: How Employers Can Navigate Cybersecurity Issues with Brandon Robinson, Maynard Nexsen Attorney
FBI Lockbit Takedown: What Does It Mean for Your Company?
Privacy Officer's Roadmap: Data Breach and Ransomware Defense – Speaking of Litigation Video Podcast
Decoding Cyber Threats: Protecting Critical Infrastructure in a Digital World — Regulatory Oversight Podcast
Life With GDPR: Episode 104 – Solar Winds and Your Mother – Tell The Truth
No Password Required: American University’s Vice Provost for Research and Innovation and a Tracker of (Cyber) Unicorns
Snooping Sadia Talks to Former Official Gene Fishel — Unauthorized Access Podcast
Life With GDPR: Critical Perspectives on Big Law Firm Cybersecurity
No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
2023 DSIR Deeper Dive: How International and Domestic Regulatory Enforcement Spotlights the Information Governance Tensions Between ‘There’ and ‘Here’ and Between ‘Keep’ and ‘Delete’
Marketing Minute with NP Strategy (Video): How to Respond to a Cyber Security Breach
Life With GDPR – Lessons Learned from The Singtel Opus Data Breach
State AG Pulse | CT AG Reacts to Genetic Data Breach
Cybersecurity in Video Games & Esports
2023 DSIR Deeper Dive: State Privacy and Data Collection
This is the second article in our two-part series on Cybersecurity in the Age of Industry 4.0, focusing on the legal implications and potential liabilities manufacturers face from cyberattacks, as well as practical...more
Editor’s Note: HaystackID hosted an educational webcast on March 15, 2023, to discuss the growing importance of cyber and data hygiene in the context of privacy, cybersecurity, and data protection. The webcast focused on how...more
Baker McKenzie recently released their sixth annual edition of ‘The Year Ahead: Global Disputes Forecast’ in which senior legal and risk leaders share what they expect to see in the coming year. From an overarching...more
Though raising projections for overall economic growth over the next 2 years, the IMF warned this week that “an uneven rollout of vaccines” threatens to add to concerns about a “K-shaped” economic recovery on a global scale. ...more
International companies should keep in mind recent developments coming out of Asia on the privacy front. Chinese authorities are reported to be confiscating smartphones at the border to install surveillance apps. Companies...more
The Situation: Protecting intangible property can be extremely challenging, but significant and effective tools are available under English law to minimize significant harm to entities that have been victimized by a data...more
Google Receives Record GDPR Fine - Marking the first major penalty against a U.S. tech company under the General Data Protection Regulation (GDPR), the French data-protection authority, CNIL, has fined Google a record $57...more
This summer, several automakers, including Tesla, Toyota, General Motors, Ford, and Volkswagen learned that their closely held trade secrets were readily available on the internet. The source? An unprotected back-up server....more
Just days after the European Union’s widely-discussed new data privacy regulations, the General Data Protection Regulation (“GDPR”), took effect on May 25, 2018, another EU-wide legal change quietly occurred. ...more
Waking up to news of another major data breach seems to have become a daily routine. On the front pages and cable news, we hear about hackers, rogue governments, and shadowy figures involved with these data breaches. But too...more
Last week saw a lot of media coverage about “Yelp for People.” The app, called Peeple, allows users to rate friends, co-workers, and romantic partners based on a five-star rating system. Recruiters could review the ratings...more
With stories of cyberattacks and data breaches on a seemingly endless loop, businesses and governments have been doubling down on their efforts to protect digital information and assets. But, in some industries, the greatest...more
Protecting Trade Secrets in the Era of the Data Breach - The prevalence of data breaches cannot be ignored. New data breaches continue to occur one after an-other. In the first half of 2015 alone there were reports of...more
Last month the country learned about the unauthorized access of the Houston Astros “Ground Control” database, which contained trade talks, proprietary statistics, and scouting reports, by members of the St. Louis Cardinals...more
On May 7, Columbia Casualty Company, an insurance company, filed one of the first lawsuits by an insurer seeking to deny coverage for a privacy class action under a cyber insurance policy. Why is this significant? As the...more
Last month’s Employment Law Commentary discussed the high level of international attention now being paid to protecting trade secrets from misappropriation, with recommendations for practical steps that companies may take to...more
Earlier this month, a federal judge in San Francisco sentenced David Nosal to a year in prison, three years’ supervised release, 400 hours of community service, and $60,000 in fines. His crime? Nosal violated the Computer...more
Former Korn/Ferry recruiter David Nosal was sentenced to one year and one day in prison on Wednesday for violating the federal Computer Fraud and Abuse Act and the Economic Espionage Act. In April, a federal jury in...more
With Chinese cyber attacks, data security, and industrial espionage occupying more and more space in the headlines, companies are re-evaluating their strategies for guarding sensitive information. There is certain to be more...more
Today’s hackers and ex-employees steal secrets with USB drives, personal email accounts, and computer networks, making computer forensics critical in detecting trade secret theft....more
On February 20, 2013, the White House issued a report outlining a new plan to combat trade secret theft from U.S. businesses. Faced with the escalating theft of U.S. trade secrets and noting “the crucial role of trade...more