News & Analysis as of

Unauthorized Access Cybersecurity Data Theft

Troutman Pepper

Understanding Access vs. Acquisition - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper on

Each of the 50 states has its own definition of what constitutes a reportable data breach. For some, it requires “unauthorized access” to personal information. For others, it requires “unauthorized acquisition.” And then,...more

Bond Schoeneck & King PLLC

Cybersecurity and Data Privacy and E-Discovery and Information Management: Second Circuit Draws Line Between Employees and Hackers...

Employers in New York face a heightened hurdle to holding employees legally accountable for theft and other misuse of company data after the Second Circuit’s recent decision in United States v. Valle. The Court has held that...more

2 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide