We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.

Search results

Order by: most recent most popular relevance



Results: 1-10 of 2,754

The $225,000 laptop: losing confidential customer data will cost you
  • Briggs and Morgan
  • USA
  • September 1 2015

One of the many examples we use in presenting seminars and panel discussions on cyber security is the "lost laptop problem:" how do broker dealers


SEC brings claims against hackers and brokers who conspired to reap benefits from insider trading scheme
  • Osler Hoskin & Harcourt LLP
  • USA
  • August 25 2015

The proper handling, management and protection of confidential information continues to be a major risk management issue facing companies, their


Unprecedented hacking and trading scheme highlights important cybersecurity lessons
  • King & Spalding LLP
  • USA
  • August 21 2015

On August 11, 2015, federal prosecutors in the District of New Jersey and the Eastern District of New York unsealed indictments against nine


The customer-side security ABCs: understanding security audit requirements in technology contracts
  • Kilpatrick Townsend & Stockton LLP
  • USA
  • August 17 2015

Many attorneys representing a client who procures technology from a service provider know to request a security audit, but there is still confusion


How private is your non-public information? Hackers and traders implicated in criminal and civil suits in hacking securities fraud scheme
  • King & Spalding LLP
  • USA
  • August 17 2015

According to a press release issued by the U.S. Attorney's Office for the District of New Jersey, the U.S. Department of Justice ("DOJ") unsealed two


Cyber crime gets back to basics: how cyber criminals are monetizing stolen information through wellworn criminal strategies
  • Debevoise & Plimpton LLP
  • USA
  • August 17 2015

News of how cyber criminals have been able to monetize the information they steal typically has been harder to come by, and less scary, than news of


Hackers and traders charged by SEC and Department of Justice in international securities fraud scheme
  • Katten Muchin Rosenman LLP
  • USA
  • August 16 2015

The computer servers of three major newswire companies were allegedly hacked as part of an elaborate illicit stock-trading scheme that resulted in


Three cybersecurity lessons from the newswires hacking indictments
  • Fish & Richardson PC
  • USA
  • August 12 2015

On Tuesday morning, federal officials announced two criminal indictments and a civil complaint against a group of defendants who allegedly worked


Checking in on Target’s derivative litigation: 18 months later, directors remain stuck in the checkout line
  • Carlton Fields Jorden Burt
  • USA
  • August 10 2015

Everyone remembers the Target Corporation data breach, one of the worst in history. In late 2013, hackers forced their way into Target's computer


Regulatory priorities corner
  • Ropes & Gray LLP
  • USA
  • August 5 2015

The following brief updates exemplify trends and areas of current focus of relevant regulatory authorities: Massachusetts Investigates