By Jonathan Bick, Brach Eichler | February 28, 2022
Since the inception of cryptocurrency as a widely traded asset, there has been increasing opportunity to make money through market manipulation, specifically through classic pump-and-dump and related fraudulent schemes, and more specifically CPDs.
By Anna Remis, Sidley Austin | February 11, 2022
Here are a few tips on data licensing you might consider to be sure you're aware of your rights to the data — and what potential pitfalls might be lurking in the shadows if you use the data.
By Victoria Hudgins | February 9, 2022
While corporate concern regarding high turnover's impact on cybersecurity varies, their outside counsel say a revolving door of remote employees can easily damage a company.
By Victoria Hudgins | February 7, 2022
Observers say law firms' mostly internal usage of collaboration tools are keeping many cybersecurity threats at bay. However, lax controls and broader access could easily expose a firm.
By Victoria Hudgins | February 4, 2022
From industrywide best standards to broker-investor customer notifications, numerous federal government agencies started the new year with a data protection focus.
By David Kalat, BRG | February 1, 2022
The use of GPS systems to track location may seem ubiquitous today. But as this month's history of cybersecurity reveals, it's a relatively recent phenomenon, dating back to one fateful airline disaster at the height of the Cold War.
By Robert Braun, Jeffer Mangels Butler & Mitchell | January 27, 2022
One of the common elements between each of the California, Virginia and Colorado laws, as well as the GDPR and most of the pending proposals, is data minimization. An enterprise can address data minimization using a few simple, straightforward steps.
By Rebecca L. Warren, Norris McLaughlin | January 25, 2022
There is a need for rapid deployment of Zero Trust, but it must be done in a practical way. In planning for Zero Trust, it is important to know that Zero Trust is premised upon five pillars: identity, device, network/environment, application workload, and data.
By Jonathan Bick, Brach Eichler | January 21, 2022
If successful, a third party can use the theft of a legal identity to secure confidential information, harm marketing brand value, diminish good will and steal customers. Here's how sites can use legal, business, and technological means to protect their legal identities.
By David Saunders and Julian L. André, McDermott Will & Emery | January 14, 2022
It started as a hushed rumor in the beltway, then became a known fact by those going to join the administration. And now we all know: The Biden administration has brought with it a renewed focus on data privacy and cybersecurity.
Presented by BigVoodoo
Law firms & in-house legal departments with a presence in the middle east celebrate outstanding achievement within the profession.
The premier educational and networking event for employee benefits brokers and agents.
The Legal Intelligencer honors lawyers leaving a mark on the legal community in Pennsylvania and Delaware.
A large and well-established Tampa company is seeking a contracts administrator to support the company's in-house attorney and manage a wide...
We are seeking an attorney to join our commercial finance practice in either our Stamford, Hartford or New Haven offices. Candidates should ...
We are seeking an attorney to join our corporate and transactional practice. Candidates should have a minimum of 8 years of general corporat...
MELICK & PORTER, LLP PROMOTES CONNECTICUT PARTNERS HOLLY ROGERS, STEVEN BANKS, and ALEXANDER AHRENS