New York Law Journal

Is Invasion of Privacy an Appropriate Analogue for Data Breach Cases?

The authors examine whether invasion of privacy torts—intentional torts—are actually analogous to data breaches where claims sound in negligence and the alleged harm may be a risk of future identity theft, rather than embarrassment or other dignitary harms. The diverging approaches of lower courts in addressing this question suggests a struggle with applying historical tradition to these novel data privacy claims.
8 minute read

The Legal Intelligencer

Pa. Hospital Agrees to $65M Class Action Settlement Over Data Breach

Unlike in most data breach cases, the plaintiffs were able to determine the specifics of the damage done to class members, Saltz Mongeluzzi partner Patrick Howard said.
4 minute read

Legaltech News

Nervous System: Honeypots in Space

Honeypots are designed to trick hackers into exposing themselves. The first known use of such a trap occurred in the mid-1980s, when a $0.75 discrepency exposed an international cadre of spies attempting to steal military secrets about the fabled "Star Wars" Strategic Defense Initiative.
5 minute read

Law.com

Risks and Ad Fraud Protection In Digital Advertising

The ever-evolving digital marketing landscape, coupled with the industry-wide adoption of programmatic advertising, poses a significant threat to the effectiveness and integrity of digital advertising campaigns. This article explores various risks to digital advertising from pixel stuffing and ad stacking to domain spoofing and bots. It will also explore what should be done to ensure ad fraud protection and improve effectiveness.
8 minute read

Corporate Counsel

Throng of Workers Using AI Off the Grid Unwittingly Aiding Cybercriminals

AI adoption has risen so much so quickly that the average knowledge worker puts more corporate data into AI tools on Saturday or Sunday than the middle of the workweek a year ago, a Cyberhaven study found.
4 minute read

The Recorder

Greenberg Traurig's Strategy to Recover $4M in Malicious Email Spoofing Attack

"This will be important for people to look at because … I think it will be one of those test cases in the blockchain space," said Dr. Tonya M. Evans, a tenured law professor at Penn State Dickinson Law.
4 minute read

Legaltech News

Deepfakes in Legal Proceedings: A Strategic Framework for Collaborative Solutions

To meet baseline duties of competence, lawyers must be prepared to detect and address deepfakes, to support a claim that audio or video evidence is fake, or to prove audio and video evidence is authentic.
13 minute read

The American Lawyer

McDermott Adds Gibson Dunn Cyber and Privacy Co-Chair to White Collar Defense Practice

The firm is hoping the marriage of Alexander Southwell's expertise and the firm's strong position in the health care sector will bear fruit.
3 minute read

Daily Report Online

Expert: Georgia Tech Faces Uphill Battle in Suit Over Cybersecurity Failures

"The government has the full force of the Department of Justice, so they can be very difficult to litigate, expensive in terms of discovery, typically there are lots of experts at multiple stages," said Kate Seikaly, managing partner of Reed Smith's Tysons, Virginia, office.
7 minute read

Law.com

Security Awareness Training: It's Time to Elevate Its Importance In Your Information Security Program

With the threat landscape changing quickly, security awareness training should include more than just a click-through video. There needs to be a focus from leadership on protecting firm assets and a near constant diligence on ensuring users know and understand the risks and how they might be compromised.
5 minute read

Resources

  • Why Are So Many Law Firms Suddenly Embracing Digital Transformation?

    Brought to you by AllRize

    Download Now

  • 2025 State Legislative Sessions

    Brought to you by LexisNexis®

    Download Now

  • Retention & Online Reputation for Law Firms: 2025 Guide

    Brought to you by Amazing Workplace, Inc.

    Download Now

  • Europe's Escalating Regulatory Framework: Mapping Efforts to Mitigate Supply Chain Risks

    Brought to you by LRN

    Download Now