School Records Session: Excerpts from 2013 Lead Litigation Conference

Spezio’s 2011 TEDxRochester Talk on Lead in Children

Vermont AG: Monitoring Customer Laptops in Debt Collection Efforts Unlawful

From Hunton & Williams LLP

“On September 8, Vermont Attorney General William Sorrell (pictured at left) announced that SEI/Aaron’s, Inc. has entered into an assurance of discontinuance, which includes […]

Congress Proposes Bill Protecting Student Data

Richard J. Bortnick of Traub Lieberman Straus & Shrewsberry

On Proposed Law to Protect  Students in the Cloud

“While the protection of private data contained within student records is not […]

Discovery of 13-Year Hacking Scheme Highlights Questions About Cyber Insurance Coverage

By Long Berk, Partner, Hunton & Williams LLP

“An Israeli security firm recently uncovered a hacking operation that had been active for more than a […]

Employee Texts Not Protected by Stored Communications Act, California Court Holds

See what Nixon Peabody’s Linn Foster Freedman has to say on the firm’s blog. She offers insights for employees and employers alike.


New Release! Conference Report & Multimedia from the NetDiligence Cyber Risk & Privacy Liability Forum 2014

It’s almost like being there. But without the cocktails.
Educating your teams on the dynamic field of cyber risk and privacy liability is essential.  The […]

When the Bill is Due, Who’s Liable for Credit Card Cyber Theft?

LexisNexis Publishes Article from NetDiligence June Conference
PCI compliance. In these times of rampant credit card fraud, few other words cause such angst for merchants […]

Vincent J. Vitkowsky Paper on Cyber Risk

War, Terrorism, and Hactivism Under Cyber Insurance Policies
By Vincent J. Vitkowsky, Partner, Seiger Gfeller Laurie LLP

Cyberspace is the world’s most dynamic domain, and cyber […]

Chandler Givens on Data Breach Litigation He Brings on Behalf of Plaintiffs

Here is a short clip from the June 2014 NetDiligence Cyber Risk & Privacy Liability Forum. Plaintiff attorney Chandler Givens answers a question posed […]

Facing mobile cyber risk? Don’t expect regulations to save you.

Compromised data is free-flowing in the criminal underground, and unfortunately, no amount of regulation can completely address that problem. So organizations are left to […]