Robert Anderson, Co-Chair of Lindabury’s Cybersecurity & Data Privacy practice group was recently interviewed by ROI-NJ’s Tom Bergeron in regards to the European Union’s May 25th institution of the General Data Protection Regulation (GDPR). Bob feels GDPR will have a huge impact in Europe where there is a different view of privacy.  “In the EU, they have taken the position that privacy is a fundamental human right and we certainly have not taken that position in the U.S., especially in terms of digital information.”

To read ROI-NJ’s full online article click here.

Cybersecurity & Data Privacy practice group co-chair, Robert Anderson’s recent interview has been included in New Jersey Business Magazine’s recent cover story ” The Digital Landscape Evolves”.  Regarding employees who work remotely, who may now pose a risk to their companies Bob says, ” I think everybody, every company, realistically, withing the constraints of what they can reasonably do, should devote significant attention to these kinds of remote access liability issues.”  Bob will be among a panel of Cybersecurity professionals at NJBIA’s upcoming “The Internet of Things – Transforming Your Business” Summit on April 20th in Newark, NJ.

To read the full article click here.

Bob Anderson, co-chair of Lindabury’s Cybersecurity and Data Privacy practice group, was recently interviewed by Karen Talley of FierceCEO, a publication that is considered a must-read source for running a business. Bob reports to Ms. Talley that “there is a tendency for businesses to not put the emphasis on employees, but they are the greatest vulnerability” and that “most cyberbreaches are caused by employees, inadvertently.”

To read the full article online click here.

Lindabury partner, Robert Anderson, shares his insight in NJBIZ’s recent article:  “The inside scoop on M&As: Plenty of big companies have learned the hard way how difficult mergers can be”

Sometimes, a planned M&A can get torpedoed because of decisions that were made long ago, notes Robert W. Anderson.  So a potential seller may wish to review its books and records long before putting up a “For Sale” sign.

One suggestion: do some housecleaning, and scour around for any loose ends. That’s because for a buyer, a “big part of an M&A involves due diligence; understanding what they’re buying and how the target company fits in with the acquirer’s business operations and goals,” says Anderson. “If they see a lot of issues, like unsigned contracts, or potential tax and other liabilities, they may back away from the deal.”

On June 1, 2017, New Jersey Governor Chris Christie signed Executive Order 225 directing NJ’s Chief Technology Officer to set in motion actions to deliver a more secure, efficient, and reliable information technology platform and services across the Executive Branch.

Previously, each state department and agency oversaw its own information technology services, software and hardware integration. Under the new Executive Order, the Chief Technology Officer of the State of New Jersey is granted broad authority to oversee and integrate the hardware, software, and other information technologies used by departments and agencies within the Executive Branch. In speaking to the Chief Technology Officer at the signing of the Executive Order, Chris Christie stated:

“This is a big day in changing state government. To take away that authority and personnel from every one of the state departments and agencies and put it in your hands is a sea change in the way government is managed given how integral information technology is to the everyday operation of government. This is about a common-sense approach to taking us to a new level in terms of our information technology, and what we know is our customers, the 8.9 million people of the State of New Jersey are going to demand we do it.”

Lindabury’s Bob Anderson, shareholder and co-chair of the Cybersecurity and Data Privacy Group, was interviewed by NJBIZ‘s Tom Bergeron in response to the worldwide ransomware attack over the weekend. Bob said the attacks last weekend were not a surprise at all to the people in the industry.

“It was just a matter of time before something like this happened,” he said. “We’ve seen ransomware attacks pick up at an incredible level the past few years. It was just going to happen at some point that somebody was going to launch something that was going to travel from computer to computer and spread to every country in the world.”

Lindabury will be represented at the NJBIZ Cybersecurity panel discussion on May 18th at Raritan Valley Country Club in Bridgewater, where the Cybersecurity and Data Privacy Group’s co-chair Eric Levine is participating as a panelist.

Businesses have a major need to assess their own cybersecurity risks, and to openly exchange internal information within the company to effectively address and mitigate an actual breach situation. Yet a company’s internal assessments of its own weaknesses and the holes in its cybersecurity protections can, ironically, actually expose the company to even greater danger in future security breach litigation. A company’s good faith internal report of its cybersecurity weaknesses can potentially serve as almost an admission that it has found its cybersecurity protections for personal and confidential data to be inadequate.

Similarly it is of extreme importance that in the midst of dealing with a cyber breach event, that the company’s personnel freely exchange information related to the breach crisis situation quickly and without undue worries about how the disclosure of that information might look in a future litigation discovery proceeding.

The involvement of the company’s legal counsel in all important aspects of a cybersecurity risk assessment and breach response is crucial because of the protections that involvement can potentially provide the company under the doctrines of (i) attorney-client privilege, and (ii) work product protection.

The United States does not currently have a single comprehensive federal law regulating data privacy and cybersecurity matters. Instead, there is a patchwork of laws which at times overlap, and in other cases may even potentially contradict one another. This patchwork, together with the growth in interstate and international data flow, heightens the risk of privacy violations and can create significant compliance challenges. Failure to meet these challenges, however, can result in government imposed civil and criminal sanctions (including fines and penalties), private lawsuits and class actions, as well as damage to a company’s reputation and customer trust.

The following is a brief summary of some of the most significant Federal legislation impacting data privacy and cybersecurity matters.

Federal Trade Commission Act (the “FTC Act”)

Identity theft is an area of major concern for consumers and businesses alike. Roughly nine million individuals in the U.S. can expect to have their identity stolen each year. With just a few items of personal information (such as the name, social security number, and the date of birth of an individual) a cyber-criminal can potentially drain existing accounts or open new credit card accounts with devastating consequences for the unwitting consumer’s credit ratings and future path in life. If your business has been lax in protecting the privacy of such personal information in its possession, you may be inviting your own devastating consequences: lawsuits by individuals experiencing identity theft as a result of your lax procedures, regulatory enforcement actions, and damage to your business reputation and loss of trust by your customers.

The Red Flags Rule, issued by the Federal Trade Commission (“FTC”), requires financial institutions and creditors with covered accounts (as defined in the Red Flag Rule) to develop a written program that identifies and detects the relevant warning signs, or red flags, of identity theft.

Red flags can include, for example:

Traditionally, aspiring entrepreneurs looking for easy, low cost access to capital to fund their start-up businesses had limited means.  Recently, sites such as Kickstarter and GoFundMe provided a platform, but the most companies could offer in exchange for a cash investment was a first look to the particualr product or other creative reward, each of which, however was not stock.

Recognizing in part that access to the capital markets should not be limited to the domain of the few, and in view of the democratizing effect the Internet has had with respect to reaching prospective investors, the Jumpstart Our Business Startups Act (JOBS Act) was enacted in April 2012.  One of the most anticipated parts of the JOBS Act was the rules pertaining to crowdfunding.

Business & Financial Services Shareholders, Robert Anderson and Monica Vir recently authored an article for the New Jersey Law Journal in which they provide an overview of the SEC’s allowance for smaller early-stage companies and start-up businesses to raise money by selling securities to non-accredited investors through qualified intermediaries, more commonly known as crowdfunding.

Contact Information