• 18 2018 May

    Webinar: When is it Okay to Use Alt Data?

    As the use of alternative data grows in popularity, firms should ensure they are leveraging this information in a way that does not violate insider trading, privacy, or market manipulation regulations. In Cordium’s webinar, When...

    Read More →

Recent Posts

Risky Business: Five Considerations for Security in Vendor Contracting

Feb 26, 2018 by Marci Rozen, Allison Bender and Jason Wool

Selecting appropriate contract clauses is a key strategy for managing security risks with vendors. Security provisions in vendor contracts should be tailored to the risks posed by the specific engagement, the supply chain for the required products or services, and each vendor’s security program. Below are five topics to consider when drafting these agreements. Hover...

Read More →

Join Us for Cocktails!

Feb 14, 2018 by Tia Sherwood

Let’s catch up! If you’ll be in town for IAPP, join us on Monday, March 26th from 6:00 PM – 9:00 PM for drinks and appetizers at Baby Wale. The bar is a two minute walk from the convention center, so please stop by and say hello! When you walk in, just look for the...

Read More →

Go us! Law360 named ZwillGen a “Privacy” and “Consumer Protection” group of the year! These accolades would not have been possible without the trust that you, our clients instill in us as we work side-by-side through the unique legal challenges that face companies today. Thank you for your support, we look forward to the exciting...

Read More →

In affirming the dismissal of the Wiretap case against Apple for its handling of iMessages from former users, the 9th Circuit yesterday affirmed the distinction it first set out in 2002 in Konop v. Hawaiian Airlines, Inc., 302 F.3d 868. In Konop, the 9th Circuit found that data in temporary electronic storage was covered by...

Read More →

Connected Cars: Looking Under the Hood at Cybersecurity Risks

Jan 24, 2018 by Jill Guidera Brown and Anna Hsia

Knight Rider fans, rejoice! Soon, you can have your own automated vehicle. While the arrival of connected cars and autonomous vehicles (“AV”) bring a potential increase in efficiency, safety, and mobility, they also present unique cybersecurity risks. In a recent global study, more than half of corporate risk managers expressed concern about cybersecurity in AV,...

Read More →

What Will Be Tech’s Hot Topics in 2018 and Beyond? Our Predictions

Jan 10, 2018 by Allison Bender, Nury Siekkinen, Jeff Landis, Ken Dreifach, Zach Lerner and Jason Wool

Technology is always changing, and the law sometimes struggles to keep pace. This can lead to more questions than answers for organizations trying to make use of innovative or evolving tools, while navigating a legal gray zone in which risks need to be managed with particular care. Fast-paced technological change can also lead to the...

Read More →