Cybersecurity threats are global, and both public- and private-sector cybersecurity efforts require international coordination. Despite an acute need for cybersecurity-specific laws and treaties, these have been slow to develop, and in this vacuum, most countries are trying to adapt and apply existing legal frameworks to combat and address cybersecurity threats. In this second part of a two-part guest article series addressing the intersection of cybersecurity and international law, Hughes Hubbard attorneys Seth Rothman and Andreas Baum explore laws related to cyber crimes and international laws that regulate business activities, including recent E.U. legislative efforts. Part one provided insight on cyber warfare and the relevant laws and treaties that address the shifting threats. See also “Prosecuting Borderless Cyber Crime Through Proactive Law Enforcement and Private Sector Cooperation” (Mar. 2, 2016).
Jul. 26, 2017
Feb. 27, 2019
Preparing for the CCPA: Securing Buy-In and Setting the Scope
Mar. 6, 2019
Preparing for the CCPA: Best Practices and Understanding Enforcement
Jul. 18, 2018
What to Expect From California’s Expansive Privacy Legislation
Mar. 13, 2019
Takeaways From 2018 COPPA Developments and a Forward-Thinking Approach to Compliance
Mar. 13, 2019
Essential M&A Cybersecurity Due Diligence Questions
Measuring the effectiveness of a compliance program can be tricky, but some companies are finding ways to use their existing internal controls to generate useful data. Join our sister publication the Anti-Corruption Report (ACR) for a complimentary webinar that explores Hewlett Packard Enterprises’ new travel-and-entertainment-approval tool. On Wednesday, March 27, 2019, from 1:00 p.m. to 2:00 p.m. EDT, the ACR’s Megan Zwiebel will interview Becky Rohr, vice-president of anti-corruption and global trade at Hewlett Packard Enterprises, about how they are using their T&E tool to measure and improve compliance. Registration information is here.