On March 15, 2023, the United States Securities and Exchange Commission (SEC) took a major step towards strengthening cybersecurity in the financial sector by proposing three new rules. These rules aim to improve privacy,...more
Earlier this year, a massive Twitter data breach occurred. Researchers are learning that the data breach was significantly more severe than initially reported.
In the first reports, one hacker was suspected of exploiting a...more
Takeaway: In many data breach cases, a cybersecurity expert may evaluate whether the company’s security measures were reasonable and appropriate or, alternatively, if the company lacked the requisite technology to detect a...more
9/15/2022
/ COOs ,
Cybersecurity ,
Data Breach ,
Expert Testimony ,
FBI ,
Gross Negligence ,
Information Technology ,
Popular ,
Reliability Standards ,
Risk Assessment ,
Willful Misconduct
Takeaway: To ensure investor safety and emphasize a commitment to user privacy, corporate executives and similarly-situated high ranking officers must not provide any statements or omissions that affirmatively create a...more
6/28/2022
/ Corporate Counsel ,
Cybersecurity ,
Data Breach ,
Data Harvesting ,
Deceptive Intent ,
Facebook ,
Google ,
Liability ,
Misleading Statements ,
Omissions ,
Popular ,
Rule 10(b) ,
Rule 10b-5 ,
SCOTUS ,
Securities Exchange Act ,
Securities Fraud
Takeaway: With the surge of data and cybersecurity breaches, corporate directors and officers have become targets for shareholder derivative lawsuits. Fortunately, there are procedural measures that directors and officers can...more
Companies and consumers alike are under perpetual assault from bad actors as IoT, work from home, and cloud migration – all intended to improve productivity – have expanded the cyber attack surface. The continually evolving...more
10/15/2021
/ Best Practices ,
Continuing Legal Education ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Breach Plans ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Retention ,
Data Security ,
Data Use Policies ,
Enforcement ,
Internal Controls ,
Personal Information ,
Popular ,
Privacy Laws ,
State Data Breach Notification Statutes ,
State Privacy Laws ,
Supply Chain ,
Webinars