Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,304 results for "Cybersecurity Law & Strategy"...

<b><i>Online Extra</b></i><br>HHS Cracks Down on Health Care Privacy Violations under HIPAA
December 01, 2016
The U.S. Department of Health and Human Services shattered previous records for enforcing the Health Insurance Portability and Accountability Act in fiscal year 2016, according to an analysis by McDermott Will & Emery health care attorneys.
Managing Risk in Light of 'Shadow IT'
November 01, 2016
Information Governance in the Age of Cloud Application Proliferation
Law Firms, Meet Your New Regulator: Your Clients
November 01, 2016
While major banks, retailers, hospitals and insurance companies were the brick and mortar of a growing media monument to hubris and cyber overconfidence, law firm breaches went mostly unnoticed. That is, until government agencies and law enforcement grew concerned that the wealth of intellectual property curated by law firms could be used to manipulate financial markets by front running trades.
Client Document Security Audits: Is Your Law Firm Ready?
November 01, 2016
It is essential for all law firms to safeguard their clients' documents against ever-evolving threats and thoroughly understand the security challenges and potential solutions in today's demanding world of legal document compliance.
Looking to the FFIEC Revised Information Security Booklet for Best Practices in Data Security for Financial Institutions
November 01, 2016
The Federal Financial Institutions Examination Council (FFIEC) recently revised its Information Security Booklet. The changes bring the financial services industry closer to the goal of having a clearly defined set of cybersecurity and data protection protocols to ensure regulatory compliance.
Legal Tech: e-Discovery: Judge Says 'NO' to Party's Bid to Force Use of Predictive Coding
November 01, 2016
Would Judge Peck's admiration and advocacy for predictive coding lead him, upon a request by the opposing party, to force a responding party to use it against that party's own wishes? Judge Peck recently faced this issue, putting potential use of predictive coding at odds with established precedent and procedure regarding how to conduct discovery.
Movers & Shakers
November 01, 2016
Movers &amp; Shakers&nbsp;Law firm Venable recently announced the addition of former AOL Inc. chief counsel, Charles D. Curran, as a partner in…
Introducing the Cybersecurity Reference Model
November 01, 2016
When EDRM and CSRM Collide, Much Is Illuminated About the Hiring Trends in Both e-Discovery and Cybersecurity
Sixth Circuit's Decision on Privacy Claims over Data Breaches
November 01, 2016
Data breaches such as the one Yahoo recently revealed (500 million accounts!) get the big headlines. In response, large companies double down on their efforts to protect the security of their data. But small to midsize businesses often fail to appreciate the risk of a data breach to their own business.
2016: The Year Everything Changed In Social Media Marketing
November 01, 2016
Three megatrends culminated in online business development in 2016, requiring attorneys to change their digital marketing tactics and to re-focus on what produces results.

MOST POPULAR STORIES