Anthem Agrees to Pay $115 Million for 2015 Cyber Intrusion to Settle Litigation!

BusinessInsurance.com reported that “Anthem Inc., the largest U.S. health insurance company, has agreed to settle litigation over a hacking in 2015 that compromised about 79 million people’s personal health information for $115 million, which lawyers said would be the largest settlement ever for a data breach.”  The June 26, 2017 report entitled “Anthem to pay record $115M to settle lawsuits over data breach” included these details: The money will be used to pay for two years of credit monitoring for people affected by the hack, the lawyers said. View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

Honda Plant Halted Operations Because of WannaCry Ransonware!

The Financial Times reported that the “Japanese carmaker revealed that it temporarily halted production at its Sayama plant, northwest of Tokyo, after it discovered that some of its computers were affected by the ransomware late on Sunday.”  The June 21, 2017 Financial Times report entitled “Honda plant hit by WannaCry ransomware attack” included a confession from Honda that the: …security measures were not sufficient for older versions of its computers such as the ones that were installed at the Sayama plant. View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

Just When You Thought It Was Safe to Use Your Company Computer*

By | All About eDiscovery | June 21, 2017
In Miller v. Zara USA Inc., (2017 N.Y. Slip Op. 04407, 1st Department June 6th, 2017), the First Department held that where, as here, a company’s written employment guidelines clearly provide that employees have no reasonable expectation of privacy when using a company-issued computer for personal purposes, no claim of attorney-client privilege over personal documents on that computer can stand. View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

7 Flavors of CyberCrimeware As a Service (CaaS) Includes Ransomware As a Service (RaaS)!

Darkreading reported that inexpensive CaaS include malware “botnets, phishing and backdoors are all offered on the cheap as subscription. These days even crime is in the cloud.”  The June 13, 2017 Darkreading report was entitled “The Rising Tide of Crimeware-as-a-Service” included these comments about RaaS: The incipient rise of ransomware has occurred in lockstep with the increasing occurrence of ransomware-as-a-service. View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

IBM Blockchain & AIG Team Up for “Smart Insurance”

Reuters reported that “AIG and IBM completed a pilot of a so-called “smart contract” multi-national policy for Standard Chartered Bank PLC which the companies said is the first of its kind using blockchain’s digital ledger technology.” The June 15, 2017 report entitled “AIG teams with IBM to use blockchain for ‘smart’ insurance policy” included this explanation: The Standard Chartered policy uses blockchain to facilitate sharing of real-time information for a main policy written in the United Kingdom, where the bank is headquartered, and three local policies in the United States, Singapore and Kenya. View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

Department of Homeland Security and FBI Release Alert Regarding North Korean “Hidden Cobra” Cyber Attacks

On June 13, 2017, the Department of Homeland Security published an alert regarding malicious cyber activity by the North Korean government, known as Hidden Cobra.  Per the DHS and FBI, Hidden Cobra uses cyber operations to the government and military’s advantage by exfiltrating data and causing disruptive cyber intrusions.  View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

Attorneys’ Professional Duty of Care When Representing Clients in Litigation or an Investigation Requires Higher Technological Literacy

The legal practice and technology go hand in hand, and a solid understanding of technology is crucial to satisfy the ethical duties owed by attorneys to their clients. In an opinion published on Feb. 21, the New York County Lawyers Association Professional Ethics Committee (the “Committee”) stressed that the legal practice needs to keep up with technology and that the duty of competence is evolving as technology advances and integrates with the practice. View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

A Needle in a Haystack – When Opposing Party Dumps Documents

Have you ever had a situation where the opposing side has responded to each of your document production requests with the response? All responsive documents within the custody and control of responding party will be produced. and then they dump thousands of documents on you with no rhyme or reason as to how they are organized. View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

GUEST BLOG: Pacemakers (Think IoT) Are Not Cybersecure, Does That Bother You?

My Guest Blogger Eddie Block (CISSP, CIPM, CIPP/G, CISA, CEH) is a senior attorney in Gardere’s Litigation Group and member of the Cybersecurity and Privacy Legal Services Team who focuses on all aspects of information cyber security, including credentialing functions, firewall and IDS deployment and monitoring, and penetration testing, and related complex litigation.  View Full Post
Tweet Like LinkedIn LinkedIn Google Plus