Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,223 results for "Cybersecurity Law & Strategy"...

Top Security Intrusion Trends the Legal Community Should Watch
February 29, 2016
Lawyers are increasingly expected to understand the implications of cybersecurity when providing advice relating to a long list of matters that include privacy compliance, contract compliance, data breach response, data breach litigation, M&A due diligence, and insurance coverage. As a result, it is important that lawyers understand the latest trends in cyber intrusions that may expose their stakeholders to unwarranted risk and allow adversaries to exploit technical and human vulnerabilities.
Top Security Intrusion Trends the Legal Community Should Watch
February 29, 2016
Lawyers are increasingly expected to understand the implications of cybersecurity when providing advice relating to a long list of matters. Legal counsel, as trusted neutral advisors, are uniquely qualified to help navigate risk considerations and bridge customer deliverables and workforce expectations with adequate security and shifting legal requirements. As a result, it is important that lawyers understand the latest trends in cyber intrusions.
A 'Cloud Security Doctrine' for Law Firms
February 29, 2016
Cloud computing may be here to stay, but is it truly safer than the solutions that it's outmoding? The Legal Cloud Computing Association (LCCA) thinks there's a path to greater security, publishing for law firms its first "Cloud Security Doctrine."
<b><i>Online Extra:</b></i> FDIC Chimes In on Cybersecurity
February 29, 2016
The Federal Deposit Insurance Corporation is the latest entity to release a framework for cybersecurity.
How Startups Can Protect Consumer Privacy and Enhance Cybersecurity
January 31, 2016
Many startup businesses collect and store vast amounts of personally identifiable information (PII) from consumers, but often fail to adequately protect the privacy of this consumer information. There could be many reasons for this, but it is likely the result of limited budgets and priorities.
Prioritizing e-Mail Security in the Legal Sector
January 31, 2016
Data breaches and cyberattacks aren't new occurrences, but it can sometimes feel like they are. It's only in the last few years that we've seen these attacks make headlines more and more, increasing in both quantity and impact.
Data Breach Liability
January 31, 2016
Today's legal departments are undergoing fundamental changes thanks in part to the imminent threat of ongoing cyberattacks. Given the massive breaches at some of the world's visible brands, it is increasingly clear that cybersecurity can no longer be regarded as the exclusive domain of IT.
Training Tomorrow's Lawyer
January 31, 2016
"There's math and technology involved? Count me out, that's why I went to law school." But the practice of law is not immune to technological advances, especially in the areas of research methodologies and, of course, electronic discovery. Furthermore, clients are continuing to focus on value, whether that is in seeking alternative fee arrangements or evaluating outside counsel on their efficient delivery of legal services.
Mobile Mayhem: Smartphones and Security (Or the Lack Thereof)
January 31, 2016
"It's a mobile jungle out there, and your corporate data is too valuable to just bungle through it."
<b><i>Online Extra:</b></i> Cybersecurity Services Lawsuit Introduces New Liability Exposure for IT Firms
January 26, 2016
A casino operator's recent lawsuit against an IT security firm it hired to investigate a data breach could pave the way for similar lawsuits to be brought by clients dissatisfied with the quality of IT security contractors' work.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Anti-Assignment Override Provisions
    UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›