Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,223 results for "Cybersecurity Law & Strategy"...

Tax Reporting Laws Raise Privacy Claim Risks for Online Companies
September 01, 2016
States are scrambling to shore up sales tax revenues that are eroding because of e-commerce sales. A new approach to sales tax collections involves information reports on customers' online purchases. This approach may create potential legal claims against many online companies for giving too much information about customers to state tax agencies or even to the customers themselves.
cyberSecure Conference
August 31, 2016
ALM's cyberSecure conference takes place Sept. 27-28 in New York. ALM cyberSecure is designed to provide business executives with the necessary tools to build and deploy a successful adaptive cybersecurity plan that comprehensively addresses detection, defense and response.
How to Understand and Protect the Data in Your Enterprise
August 01, 2016
Especially in a time where cybersecurity remains in the headlines on a regular basis, it's crucial to understand what data exists in order to protect it. Where's your data? What if you lost track of some of it? What if attackers copied it?
The Real-World Impact of the Yates Memo
August 01, 2016
The DOJ is focused on prosecuting individuals who are responsible for corporate wrongdoing, and corporations must be prepared to provide all available facts about the individuals responsible for the wrongdoing if they wish to receive any cooperation credit from the DOJ. This is the thrust of the DOJ's "Yates Memo."
EU-U.S. Privacy Shield Finalized
August 01, 2016
The European Commission concluded more than six months of negotiations both within the EU institutions and with the U.S. on July 12 with the announcement that an agreement had been reached on the Privacy Shield scheme to transfer data from the EU to the U.S.
The User-Friendly Proxy Statement
August 01, 2016
Attention, public companies: While your proxy statement is likely your most read disclosure document, its readership is spotty. Your retail owners and employees likely focus on some of the compensation information, but little else. Here's how to fix the problem.
EFF Challenges DMCA's Anti-Circumvention Provision
August 01, 2016
The Electronic Frontier Foundation and Wilson Sonsini Goodrich & Rosati have teamed up to challenge provisions in U.S. copyright law that threaten harsh penalties for breaking "digital locks" guarding content such as music and software code.
<b><i>Legal Tech:</b></i> Modernizing Litigation Practice: What Can the U.S. Learn from Electronic Courtrooms and Paperless Trials Abroad?
August 01, 2016
Legal professionals interested in the next wave of innovation in litigation technology can look overseas to the developments over the last several years in the UK and Singapore.
Five Steps to a Successful Social Media Strategy
August 01, 2016
Have you heard? Social media is mainstream ' 70% of the U.S.are using social media and more than 50% of them are over the age of 35 (that's right ' it's not just millennials). But did you know that in-house counsel are active social media participants? In fact, their usage is growing and today nearly two-thirds of general counsel (GCs) are engaging at least weekly in social media for professional reasons.
The Enemy Is Inside the Wire
August 01, 2016
By now you've likely read the headlines about the recent attacks on various Asian banks, resulting in cyber losses reported in the tens of billions. And if you're really paying attention, you probably know these attacks have been linked to the Lazarus cybercrime organization, which was also identified as the likely culprit behind the attacks on Sony in 2014. In all likelihood, you read the headlines, and then you moved on to read the latest sports scores. Why? Because it doesn't relate to you. Or does it?

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›