As some of the biggest companies in the U.S. have learned firsthand, corporate data breach victims often find themselves scrambling to recover their data after a malicious cyberattack. Whether it comes to the theft of trade secrets, proprietary source codes, detailed manufacturing processes or even embarrassing emails, companies often have a limited range of options for actually getting their stolen data back. One powerful—but often overlooked—vehicle for potentially recovering stolen data is the Georgia Racketeer and Influenced Corrupt Organizations Act’s unusually robust civil remedy provision.
Consider, for example, an all too familiar set of scenarios involving malicious insiders: An employee downloads troves of data before leaving the company; a current employee remotely conducts late-night downloads of valuable company information for no obvious work-related reason; or a disgruntled insider threatens to disclose sensitive data unless his settlement demands are met. By the time the company finds out, the insider may have already transmitted the data to third parties. To make matters worse, such insiders may be storing company data in personal laptops, various storage drives, email accounts, cloud-based servers, and other places beyond the immediate reach of the company.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.
For questions call 1-877-256-2472 or contact us at [email protected]