This post originally appeared in the June edition of Cyber Law & Strategy.
Somewhere today at least one data security breach is likely to happen. It might not have been publicized and may not have involved millions of records, but there is no doubt it will happen. That is because cybercrime remains one of the most common crimes in the world, and noncriminal exposures are fairly common as well.
Continue Reading Security Breach Responses — As Important and Difficult As Ever
Please join us for a one-hour CLE webinar on Tuesday, July 24, 2018, at 1:00 p.m. Eastern / 12:00 p.m. Central / 10:00 a.m. Pacific.
On Friday, May 18, Eric Barton participated in a panel discussion at the 2018 ITechLaw World Technology Conference, updating attorneys from around the globe on the latest developments in cyber vulnerabilities and crime. In today’s world, businesses and individuals face the certain knowledge that electronic systems are not entirely secure. Mr. Barton’s presentation provided “real world” guidance on how companies
Continuing our annual tradition, we present the top developments/headlines for 2017/2018 in trade secret, computer fraud, and non-compete law.
On January 25th at 12:00 p.m. Central Time, in Seyfarth’s first installment of its 2018 Trade Secrets Webinar series, Seyfarth attorneys will review noteworthy cases and other legal developments from across the nation over the last year in the areas of trade secrets and data theft, non-competes and other restrictive covenants, and computer fraud. Plus, they will provide their predictions
Throughout 2017, Seyfarth Shaw’s dedicated Trade Secrets, Computer Fraud & Non-Competes Practice Group hosted a series of CLE webinars that addressed significant issues facing clients today in this important and ever-changing area of law. The series consisted of six webinars:
As a special feature of our blog—special guest postings by experts, clients, and other professionals—please enjoy this blog entry from Jonathan Karchmer, a senior managing consultant at iDiscovery Solutions.
The use of open file sharing platforms in business continues to increase in 2017; Dropbox alone has over 200,000 active business accounts. Unfortunately, the convenience of these platforms and the increase in use by businesses attracts the attention of hackers as well. File sharing platforms and accounts have a high “hack value”—the overall value of the accounts on the dark web—due to the relative ease with which account can be obtained and the sensitivity of the information stored on these platforms.