Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,223 results for "Cybersecurity Law & Strategy"...

<b><i>Online Extra:</b></i> Canadian Financial Regulatory Organization Releases Cybersecurity Guides
January 26, 2016
Cybersecurity and an increase in data breaches isn't merely a U.S. problem. On Dec. 21, the Investment Industry Regulatory Organization of Canada (IIROC), a self-regulatory organization that helps oversee the country's trading industry, released two guides to help investment dealers protect themselves and their clients against cyber attack.
<b><i>Online Extra:</b></i> SEC to Focus on Cybersecurity Compliance in 2016
January 26, 2016
In 2016, the U.S. Securities and Exchange Commission will remain focused on assessing cybersecurity efforts by investment adviseors and broker-dealers.
The Inevitable Reinvention of the e-Discovery Industry
December 31, 2015
Electronic discovery professionals should consider a future where their current skills no longer merit the salaries they are accustomed to commanding. The current talents and knowledge bases that allow for professional leverage or vertical mobility in today's e-discovery job market still have, and will always have, immense value to their employers. However, the growing reality is that employers will not need ' or be able ' to compensate the professional population with premiums in salary.
Big Investments In Cybersecurity A Must, GCs Say
December 31, 2015
More than ever before, in-house counsel are focused on and willing to devote resources to cybersecurity, a comprehensive survey from the Association of Corporate Counsel (ACC) found. But many have yet to take the necessary steps to ensure their data is protected. As the survey and anecdotes from general counsel show, for many companies, it isn't until after a data incident that they address what areas need shoring up.
Cybersecurity Insurance Coverage: Prudent Risk Management for Companies of All Sizes
December 31, 2015
The Connecticut Supreme Court recently published the much anticipated decision in <I>Recall Total Info. Mgmt., Inc. v. Fed. Ins. Co.</I> However, those waiting for expanded guidance from the court with respect to coverage for cyber law and/or cyber exposures were most likely disappointed.
Wyndham Settles FTC Data Breach Suit
December 31, 2015
Being a test case can make you a hero, your name immortalized in case cites as you bask in amici gratitude.
Mobile Mayhem: Smartphones and Security (Or the Lack Thereof)
December 31, 2015
BYOD implementation can come in a wide variety of different formulations, but it essentially means that employees are choosing their own hardware and, to one degree or another, mixing personal and business use on a device. This means personal devices with no control from employers other than perhaps some unmonitored, unenforced, and mostly unread policy guidance.
Prioritizing e-Mail Security in the Legal Sector
November 30, 2015
Data breaches and cyberattacks aren't new occurrences, but it can sometimes feel like they are. It's only in the last few years that we've seen these attacks make headlines more and more, increasing in both quantity and impact.
CISA Passes: What It Means for Organizations and Their Data
November 30, 2015
The Cybersecurity Information Sharing Act (CISA) was passed by the Senate on Oct. 27, and while it still has a few hoops to jump through before it is enacted into law, the hotly debated proposed rules may considerably impact both those organizations holding sensitive data and the users to which that data belongs.
'Internet of Things' Litigation and Regulatory Risk
November 30, 2015
Most lawyers have heard of the "Internet of Things." Business leaders, after all, are busy making the Internet of Things (IoT) the next great wave of innovation to sweep across the global economy. Apple, AT&amp;T, Cisco, General Electric, Google, Honeywell, Intel, Microsoft, Oracle, Panasonic, Samsung, and scores of others have been investing in the IoT for years. With current predictions of a $15 trillion IoT market in fewer than 10 years, it is easy to understand why so many industry giants have made the IoT a strategic priority.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Anti-Assignment Override Provisions
    UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›