The Legal Intelligencer | Commentary
By Joshua A. Mooney | April 9, 2024
Liability under state WESCA claims turns on whether there was there an interception of a communication (and if so, where that interception took place), and whether the party whose communication was intercepted had granted consent. This article focuses on the third element—consent.
New York Law Journal | Expert Opinion
By Olivia J. Greer, Catherine Kim and Jeeyoon Chung | April 2, 2024
In December, the SEC's new cybersecurity rules went into effect, requiring detailed reporting by public companies regarding cybersecurity risk management, strategy, governance and—perhaps most notably—incidents. This article offers a practical guide to navigating the new disclosure requirements and an overview of how some companies have already begun to respond, as well as analysis of the SEC's rule in the context of a broader trend of regulatory reporting requirements
By Brian Lee | March 29, 2024
The new rules, set to come into effect on April 15, have prompted a conversation over how DFS will approach their enforcement.
By Maydeen Merino | March 28, 2024
"As access to advanced AI tools becomes more widespread, it is likely that, at least initially, cyberthreat actors utilizing emerging AI tools will have the advantage," the department reported.
By Jane Wester | March 26, 2024
Ally, through its attorneys at Simpson Thacher & Bartlett, moved to dismiss the original complaint, saying its response was successful.
By Andrew Denney | March 22, 2024
In addition to handling tech abuse matters, the new firm has a cybersecurity practice and takes cases involving prisoner's rights, consumer protection and elder abuse.
By Jessica Seah | March 21, 2024
Quinn Emanuel, Skadden, Wilson Sonsini, Sullivan & Cromwell, Gibson Dunn and O'Melveny are all representing parties in the lawsuit.
New York Law Journal | Analysis
By Matthew Richardson and Morgan Jones | March 5, 2024
Responding to data breaches involving personal data from across the globe has many moving pieces and specific timing requirements. These pieces must be in place and fit together in order for the incident response process to work as seamlessly as the client expects.
New York Law Journal | Analysis
By Mark A. Berman | March 4, 2024
Given the prevalence of spoofing, phishing, hacking and ransomware attacks, all businesses need to have appropriate cybersecurity insurance. But, will it cover you when the attack hits and for what? Sometimes yes, sometimes no and sometimes maybe!
Corporate Counsel | Expert Opinion
By Harry Valetk | March 1, 2024
A greater public awareness is needed about the harmful and inflammatory impact deep fake audio and video imagery can have on our society, and the risks associated with reputational attacks on our public and private institutions.
Presented by BigVoodoo
The New York Law Journal honors attorneys and judges who have made a remarkable difference in the legal profession in New York.
Law firms & in-house legal departments with a presence in the middle east celebrate outstanding achievement within the profession.
The premier educational and networking event for employee benefits brokers and agents.
A large and well-established Tampa company is seeking a contracts administrator to support the company's in-house attorney and manage a wide...
We are seeking an attorney to join our commercial finance practice in either our Stamford, Hartford or New Haven offices. Candidates should ...
We are seeking an attorney to join our corporate and transactional practice. Candidates should have a minimum of 8 years of general corporat...
MELICK & PORTER, LLP PROMOTES CONNECTICUT PARTNERS HOLLY ROGERS, STEVEN BANKS, and ALEXANDER AHRENS