Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,230 results for "Cybersecurity Law & Strategy"...

Survey: Distrust of Vendors Raises Questions on Data Security, Regulatory Compliance
Obviously, data breaches aren't trust builders, but many companies are skeptical even of those parties with whom they share confidential data, including their own vendors.
Benefits and Risks of the Internet of Things
The buzz phrase "Internet of Things" is seemingly everywhere. What is it, what can it do for us, and what concerns does it present? More specifically, while the Internet of Things (IoT) presents tremendous opportunities for businesses, are there corresponding risks, or elements of the IoT that businesses should consider staying away from?
Movers & Shakers
A Collection of Moves in the Cybersecurity and Privacy Practice Areas
FCC's Proposed Data Privacy and Security Rulemaking for Broadband Internet Access Providers
In 2015, the FCC issued its Open Internet Order, applying Section 222 of the federal Communications Act to broadband Internet access services (BIAS), and in doing so took jurisdiction over privacy and data security matters for Internet Service Providers (ISPs).
EXCITING NEWS!!!
Beginning with the June Issue, <i>LJN's Legal Tech Newsletter</i> will be incorporated into our all-new, cutting-edge title: <i>Cybersecurity Law &amp; Strategy.</i>
Law Firms Grapple With Cybersecurity Issues and Regulatory Risks
Security is always a concern for law firms, and the risks have only grown in recent years. Increasingly, attorneys, staff and clients have become more mobile and rely on an array of laptops, smartphones and tablets to stay connected 24/7. As more data is created and resides in more places, it becomes more vulnerable.
EU Approves GDPR
Coming off the heels of the EU Article 29 Working Party Opinion on the Privacy Shield, the EU Parliament passed the General Data Protection Regulation (GDPR) on April 15, which overhauls the union's Data Protection Directive rules set forth in 1995. This regulation applies to all business and organizations targeting EU consumers, regardless of their geographic location.
EXCITING NEWS!!!
Beginning with the June Issue, <i>e-Commerce Law &amp; Strategy</i> will no longer exist as a single entity. Instead, it will continue its evolution into our all-new, cutting-edge title: <i>Cybersecurity Law &amp; Strategy</i>.
Law Firms Grapple With Cybersecurity Issues and Regulatory Risks
Security is always a concern for law firms, and the risks have only grown in recent years. Increasingly, attorneys, staff and clients have become more mobile and rely on an array of laptops, smartphones and tablets to stay connected 24/7. As more data is created and resides in more places, it becomes more vulnerable.
Cybersecurity Meets EDRM with the Cybersecurity Reference Model
Many legal technology practitioners have great familiarity with the Electronic Discovery Reference Model (EDRM). The model allows attorneys and those who support them to use a common lexicon while wrestling with the complex issues and tasks associated with the discovery process. As the legal technology industry moves deeper into commoditization, new skills, knowledge bases and technology related to security and privacy outside the traditional EDRM will increasingly become the focal point for professional development.

MOST POPULAR STORIES