We found 1,223 results for "Cybersecurity Law & Strategy"...
Managing Risk in Light of 'Shadow IT'
November 01, 2016
Information Governance in the Age of Cloud Application Proliferation
Law Firms, Meet Your New Regulator: Your Clients
November 01, 2016
While major banks, retailers, hospitals and insurance companies were the brick and mortar of a growing media monument to hubris and cyber overconfidence, law firm breaches went mostly unnoticed. That is, until government agencies and law enforcement grew concerned that the wealth of intellectual property curated by law firms could be used to manipulate financial markets by front running trades.
Client Document Security Audits: Is Your Law Firm Ready?
November 01, 2016
It is essential for all law firms to safeguard their clients' documents against ever-evolving threats and thoroughly understand the security challenges and potential solutions in today's demanding world of legal document compliance.
Looking to the FFIEC Revised Information Security Booklet for Best Practices in Data Security for Financial Institutions
November 01, 2016
The Federal Financial Institutions Examination Council (FFIEC) recently revised its Information Security Booklet. The changes bring the financial services industry closer to the goal of having a clearly defined set of cybersecurity and data protection protocols to ensure regulatory compliance.
Legal Tech: e-Discovery: Judge Says 'NO' to Party's Bid to Force Use of Predictive Coding
November 01, 2016
Would Judge Peck's admiration and advocacy for predictive coding lead him, upon a request by the opposing party, to force a responding party to use it against that party's own wishes? Judge Peck recently faced this issue, putting potential use of predictive coding at odds with established precedent and procedure regarding how to conduct discovery.
Movers & Shakers
November 01, 2016
Movers & Shakers Law firm Venable recently announced the addition of former AOL Inc. chief counsel, Charles D. Curran, as a partner in…
Introducing the Cybersecurity Reference Model
November 01, 2016
When EDRM and CSRM Collide, Much Is Illuminated About the Hiring Trends in Both e-Discovery and Cybersecurity
Sixth Circuit's Decision on Privacy Claims over Data Breaches
November 01, 2016
Data breaches such as the one Yahoo recently revealed (500 million accounts!) get the big headlines. In response, large companies double down on their efforts to protect the security of their data. But small to midsize businesses often fail to appreciate the risk of a data breach to their own business.
2016: The Year Everything Changed In Social Media Marketing
November 01, 2016
Three megatrends culminated in online business development in 2016, requiring attorneys to change their digital marketing tactics and to re-focus on what produces results.
Seizure Issues To Consider in Federal Trade Secrets Act
November 01, 2016
Both before and after the passage of the Defend Trade Secrets Act (DTSA) in May 2016, which created a federal civil cause of action for trade secrets misappropriation, much ink was spilled over the controversial “seizure” provision.
MOST POPULAR STORIES
- Strategic Uses of a Rule 2004 ExamWhile most bankruptcy practitioners are familiar with the basic concepts behind the Rule 2004 exam, some are less familiar with the procedural intricacies of obtaining, conducting, and responding to the exam ' intricacies that often involve practices and procedures adapted from civil discovery that are beyond the scope of pure bankruptcy practice. This article explains.Read More ›
- COVID-19: Economic Stimulus and SBA LoansA summary of information on the various provisions under the new federal economic stimulus package.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›