0 results for 'null'
Searching for Yes: Defining Consent in Website Data Processing and Online Litigation
Liability under state WESCA claims turns on whether there was there an interception of a communication (and if so, where that interception took place), and whether the party whose communication was intercepted had granted consent. This article focuses on the third element—consent.The Year of Cyber Disclosures: Navigating the SEC's New Rules
In December, the SEC's new cybersecurity rules went into effect, requiring detailed reporting by public companies regarding cybersecurity risk management, strategy, governance and—perhaps most notably—incidents. This article offers a practical guide to navigating the new disclosure requirements and an overview of how some companies have already begun to respond, as well as analysis of the SEC's rule in the context of a broader trend of regulatory reporting requirementsNY Cybersecurity Rules to Require Financial Services Firms to Report Reasons for Noncompliance
The new rules, set to come into effect on April 15, have prompted a conversation over how DFS will approach their enforcement.Treasury Warns of AI's Threat to Financial Sector, Says Cyberattackers 'Outpacing' Defenses
"As access to advanced AI tools becomes more widespread, it is likely that, at least initially, cyberthreat actors utilizing emerging AI tools will have the advantage," the department reported.'Too Speculative': US Judge Throws Out Data Breach Suit Against Ally Financial
Ally, through its attorneys at Simpson Thacher & Bartlett, moved to dismiss the original complaint, saying its response was successful.View more book results for the query "*"
Attorney Launches New Firm With Former Client Who Faced High-Profile Revenge Porn Attack
In addition to handling tech abuse matters, the new firm has a cybersecurity practice and takes cases involving prisoner's rights, consumer protection and elder abuse.8 Firms Facing Off in SDNY Class Action Suit Against Chinese Ride-Hailing Service
Quinn Emanuel, Skadden, Wilson Sonsini, Sullivan & Cromwell, Gibson Dunn and O'Melveny are all representing parties in the lawsuit.When Global Reach Can Mean Global Breach
Responding to data breaches involving personal data from across the globe has many moving pieces and specific timing requirements. These pieces must be in place and fit together in order for the incident response process to work as seamlessly as the client expects.Does Your Insurance Fully Cover a Cyber Attack? Maybe Yes, Maybe No!
Given the prevalence of spoofing, phishing, hacking and ransomware attacks, all businesses need to have appropriate cybersecurity insurance. But, will it cover you when the attack hits and for what? Sometimes yes, sometimes no and sometimes maybe!Deep Fakes Causing Real Harms: Time to Take Action
A greater public awareness is needed about the harmful and inflammatory impact deep fake audio and video imagery can have on our society, and the risks associated with reputational attacks on our public and private institutions.Candid Conversations: Couples, Money & Conflict
Brought to you by eMoney Advisor
Download Now
7 Proven Strategies for Implementing a Workers' Comp Cloud Platform
Brought to you by Origami Risk
Download Now
Maximizing Liquidity and Loan Growth: A Credit Union's Success Story
Brought to you by Upstart
Download Now
Clean Your Data to Support Member Retention and Growth
Brought to you by Melissa
Download Now