DEVELOPMENTS & COMMENTARY

California Privacy Ballot Initiative Tentatively on Hold in Exchange for New Privacy Legislation

The Los Angeles Times has reported that the California Legislature and the activists behind the California Consumer Privacy Act of 2018 have reached a tentative deal for the withdrawal of the privacy measure primed for the November ballot. In exchange for the withdrawal of the Ballot Initiative, Democrats in the

Collision Course: Foreign Influence Operations, Data Security and Privacy

On June 11, 2018, Deputy Assistant Attorney General Adam Hickey testified to the Senate Judiciary Committee about “foreign influence operations, which include cyber efforts to interfere in our elections. As stated by Hickey, “[f]oreign influence operations include covert actions by foreign governments intended to affect U.S. political sentiment and public

Net Neutrality Update

This article was originally published in The Media Law Resource Law Bulletin.

Net Neutrality is the issue that won’t die. This article provides a brief update on where the policy, legal, and political disputes surrounding it stand as of May 2018.

Click here to visit the Media Law Resource

What Lawyers Need to Know About Security Techniques and Technologies to Mitigate Breach Risk (Part Two of Three)

This article was first published in the Cybersecurity Law Report.

IT has an indisputably important role in implementing a defense-in-depth cybersecurity strategy, however, the legal team is also a crucial part of a company’s cyber program. With input from technical and legal experts, including DWT’s Amy Mushahwar, this

What Lawyers Need to Know About Security Techniques and Technologies to Mitigate Breach Risk (Part One of Three)

This article was first published in the Cybersecurity Law Report.

IT has an indisputably important role in implementing a defense-in-depth cybersecurity strategy, however, the legal team is also a crucial part of a company’s cyber program. With input from technical and legal experts, including DWT’s Amy Mushahwar, this

RESOURCES & UPDATES

What Lawyers Need to Know About Security Techniques and Technologies to Mitigate Breach Risk (Part Three of Three)

This article was first published in the Cybersecurity Law Report.

IT has an indisputably important role in implementing a defense-in-depth cybersecurity strategy, however, the legal team is also a crucial part of a company’s cyber program. With input from technical and legal experts, including DWT’s Amy Mushahwar, this

Want to Play a GDPR Breach Notice War Game?

Cyber risks are constantly evolving, but the General Data Protection Regulation (GDPR) adds a new complication to a company’s incident response procedure. Notice within a 72-hour time frame to the appropriate Data Protection Authorities.

Please join us for a mock crisis conference call of a client with data in the

“Reasonable” Cybersecurity for Businesses: Developing a Comprehensive Cybersecurity Strategy

Join DWT’s Amy Mushahwar and Brandon Graves on June 28th as they discuss “Reasonable” Cybersecurity for Businesses: Developing a Comprehensive Cybersecurity Strategy

 

How do you get to “reasonable” security? No company, regardless of how large, has enough resources for all of the cybersecurity tools its CISO would like

ePrivacy and Security: Striking a Balance

Join DWT’s Bob Stankey in Brussels on June 5th for Euractive’s event: “Wire Taps on Your Apps? ePrivacy and Security: Striking a Balance”.

Does the ePrivacy Regulation set a high standard for the confidentiality of electronic communications, or is it a far-reaching expansion of government surveillance authority? While

NYC FinTech & CyberSecurity FastTrack Event, Hosted by DWT

22 June, 2018 9:30 am – 5:30 pm

Davis Wright Tremaine’s New York Office

 

What is Fast Track?

Startupbootcamp FastTracks are informal events that we host all over the world to meet the most suitable early-stage companies interested in joining our program. For each FastTrack, we invite the top

LexBlog