Surveillance: What's an Intrusion?
With litigation, private investigators, Google Alerts, and social media monitoring are common devices by which to uncover facts and...
Propose Topics!
Feel free to reach out if you would like Sarah to look at a particular issue, event, or item of proposed legislation. You can also Tweet articles and suggestions to @LaCyberLawBlog.
Surveillance: What's an Intrusion?
Fitting Cyber into Federal Procedure: Square Peg, Round Hole
Old Fashioned Interpleader: A Solution to Cryptocurrency Disputes
3 Weeks of Intense Cyber Activity
The Good, The Bad, and the Ugly
CYBER ADVICE FROM CISA & GOVERNOR'S OFFICE OF HOMELAND SECURITY AND EMERGENCY PREPAREDNESS (LA)
RUSSIA & YOUR ROUTER
Romantic Cyber Crimes
To Sue or be Sued?
Why are CEOs Increasingly Targeted by Hackers?
Cyber Insurance Rates: Up, Up, and Away!
Malicious QR Codes - The Digital Slip & Fall
CYBERSECURITY EXPERTS – WHO QUALIFIES?
2 Warning Signs of Double-Encryption Ransomware
Unauthorized PI Access: A Compensable Injury (in court)
WTF is Log4j - Why do I care?
U.S. Government Doubles-Down on Cybersecurity Enforcement (Prison?)
HIPAA FINES TREND DOWN; CORRECTIVE ACTIONS TREND UP
Lax Cybersecurity Practices Create More Lawsuits
CAR DEALERS AND MORTGAGE BROKERS: GLBA Safeguards Rule Now Applies to YOU!