Cyberthreats

Special Agent Chad Hunt provided the following links as resources in assessing and protecting against cyberthreats:

 Best Practices for Victim response and Reporting of Cyber Incidents:
http://www.justice.gov/criminal/cybercrime/docs/04272015reporting-cyber-incidents-final.pdf              

·         DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC § 2702(a)(3):
https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/03/26/guidance-for-ecpa-issue-5-9-2014.pdf             

·         Ransomware Brochure: 
https://www.fbi.gov/about-us/investigate/cyber/ransomware-brochure 

·         Incidents of Ransomware on the Rise Protect Yourself and Your Organization:
https://www.fbi.gov/news/stories/2016/april/incidents-of-ransomware-on-the-rise/incidents-of-ransomware-on-the-rise

·         Criminals Continue to Defraud and Extort Funds from Victims Using CryptoWall Ransomware Schemes:
https://www.ic3.gov/media/2015/150623.aspx

·         Extortion E-mail Schemes Tied to Recent High-Profile Data Breaches:
http://www.ic3.gov/media/2016/160601.aspx

·         Strategies to Mitigate Targeted Cyber Intrusions:
http://www.asd.gov.au/infosec/top-mitigations/mitigations-2014-table.htm

Legal Aspects of Automated Driving

Description

On February 16, 2016, the Section held a CLE event presented by Professor Bryant Walker Smith, assistant professor in the School of Law and (by courtesy) in the School of Engineering at the University of South Carolina. 

Resources

"Proximity-Driven Liability"  - Professor Smith's article examining liability issues in connection with automated vehicles. 

Additional Information

www.newlypossible.org - an online presence maintained by Professor Smith containing his articles and other resources on automated driving and other emerging technologies.

Lawyers and Social Branding Presentation

Description

Presented by Michael A. Albino, Esq., Business Development Manager at Kredible with Dorothéa Bozicolona-Volpe, Social Media Strategist at Social Espionage at the Technology Law Section Meeting on April 20, 2015.

This presentation will help you understand the value of the lawyers online presence and business development techniques. Also, everything you need to know about LinkedIn. We will present research conducted by Kredible, in association with Georgia Tech on a broad cross-section of in-house counsel that shows in detail exactly how online tools have changed forever the way the credibility of law firms and their attorneys is vetted. The research used a variety of methods to study the way in-house counsel use online tools to vet attorneys.

Resources

  • Lawyers and Social Branding Presentation (.ppt) (.pdf)

Additional Information

  • None

Back to Resources

Data Breach Crisis Management, End to End

Description

Presented at the 29th Annual Technology Law Institute in October  2014 by the following panel.

Moderator:

  • Larry H. Kunin, Partner, Morris, Manning & Martin, LLP

Panelists:

  • Daniel J. Schroeder, Partner in Charge, Information Assurance Services, Habif, Arogeti & Wynne
  • Tom Donahue, Senior VP, Crisis and Reputation Management, Porter Novelli
  • Jessica F. Pardi, Partner, Morris Manning & Martin, LLP
  • Marty Smith, CIO, GreenSky Trade Credit

Resources

Additional Information

  • None

Back to Resources

Electronic Health Records and Big Data — Risks and Advantages of Amassing Medical Databases

Description

Presented at the 29th Annual Technology Law Institute in October 2014 by Kris West, Associate VP for Research, Director, Office of Research Compliance, Emory University and Sandra Gardiner, Associate General Counsel, McKesson Corp.

Resources

Additional Information

  • None

Back to Resources