If you missed our eDiscovery Solutions team’s presentations last year in St. Louis and Kansas City—Five Things Every GC Should Know about their IT Environment—fear not, we have the recap for you here.
On March 15, 2018 the U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) exercised its authority to issue cyber sanctions under Executive Order 13694 and the new Countering America’s Adversaries Through Sanctions Act (CAATSA) by imposing blocking sanctions against 5 Russian entities and 19 Russian individuals connected to previous Russian cyber operations directed towards the United States. In an accompanying press release, OFAC stated that these sanctions were intended to counter Russian destabilizing activities such as interference in the 2016 US election, the 2017 global NotPetya cyber-attack and other cyber-attacks directed at critical U.S. infrastructure sectors. One aspect of this move was somewhat puzzling, because 9 of the total 24 sanctioned entities and individuals were already subject to blocking sanctions for their previous activities. For those 9 sanctioned entities and individuals, (which include Russia’s Federal Security Service (the FSB) and Main Intelligence Directorate (the GRU), whose initial designation we covered here), it is unclear what OFAC seeks to accomplish by imposing blocking sanctions against them for a second time.
The influence of the Internet of Things (IoT) will undoubtedly be transformational with a total potential economic impact estimated to be $3.9 trillion to $11.1 trillion a year by 2025. In the race into the IoT marketplace, there are both known and unknown legal hurdles that will affect those who offer of goods and services during the proliferation of the Internet of Things.
Some of the current and potential legal hurdles related to the IoT are well known, some are not, and some are the result of the intersection between the physical and virtual worlds, and the collision between two intersecting major drivers of innovation in IoT. On one hand, there are the established manufacturers of products and consumer goods whose expertise in developing, testing and manufacturing products puts them in an advantageous position. On the other hand, there are the technology companies who are used to developing software and whose expertise lies in software development, data collection, and data processing. Continue Reading Hurdles the Internet of Things Must Clear for Manufacturers and Providers
The Office of Foreign Assets Control (“OFAC”) recently announced new sanctions on entities and individuals in Iran and Mexico. These sanctions were designated against individuals associated with Iran’s Islamic Revolutionary Guards Corps (“the Quds Force”), Iranian entities involved in hacking against American financial institutions in 2011 and 2012, and Mexican businesses and individuals associated with drug trafficking.
It seems like we hear about a new data breach every week. Thanks to one of the most recent breaches, you could be only ten dollars away from getting in touch with your favorite A-list celebrity. Instagram — the Facebook-owned photo sharing company — was recently hacked due to a flaw in the program. Most recent reports indicate up to six million Instagram users’ email addresses and phone numbers may have been made public due to the data breach.
While the breach initially appeared to affect only celebrities and verified accounts, it has now been shown to affect a much wider range of accounts.
You are an entrepreneur. You have great ideas. Those ideas are going to change your industry. In most cases, to accomplish those goals, you are going to need help from others. How do you protect your intellectual property and data? You need to focus on protecting those assets in the contracting process.
Most developing companies rely on third party service providers. As an entrepreneur, you will likely rely on hosting and cloud solutions. While we advise that you consider business considerations first, you should also consider legal issues relating to data privacy and security issues. You cannot achieve 100% security for your assets, but there are many ways to protect yourself. You should also consider obtaining cyber-liability insurance for your company and you should ask your service providers whether they have it.
Today, President Trump officially signed H.R. 3364, the “Countering America’s Adversaries Through Sanctions Act” (CAATSA) into law. CAATSA originated as a bill which was focused on only Iran. However, partially in response to Russian cyber-interference with the 2016 election, the Senate expanded CAATSA to impose additional sanctions against Russia and also codify into law various sanctions imposed by the Obama Administration in the form of Executive Orders. The House of Representatives then approved these additions and added further sanctions against North Korea. Eventually, the House and Senate approved the final version of CAATSA by a margin of 419-3 and 98-2, respectively. For additional detail on CAATSA’s legislative history, please see our previous alerts here, here and here.
Data security breaches are impacting long-standing and start-up corporations, as well as public and private entities. No one is immune from these threats and understanding the prevalence is the first step in best preventing this from impacting your organization.
On Thursday, June 15, 2017, by a vote of 98-2, the U.S. Senate overwhelmingly passed a bill that would potentially impose additional sanctions against Russia and give Congress the power to delay and/or prevent any action by President Trump to lift or relax sanctions against Russia. Tentatively titled the “Countering Russian Influence in Europe and Eurasia Act of 2017” (“CRIEEA”), the bill must now proceed to the U.S. House of Representatives for further deliberation and approval.
Is your company prepared for a potential ransomware attack? Ransomware is a type of malicious software feared most by corporate boards and IT departments as it could completely shut down an entire network of computers and compromise large amounts of critical and sensitive data. In a post on Husch Blackwell’s Byte Back blog, Mindi Giftos provides simple yet important steps companies should take to prepare for and minimize the risk of a cyber attack.