Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,223 results for "Cybersecurity Law & Strategy"...

Training Tomorrow's Lawyer
November 30, 2015
There's math and technology involved? Count me out, that's why I went to law school." The attorneys in the room nod at each other, smiling at this joke that more than a few of us have told at one point in our careers. But it looks like this joke has finally run its course. The practice of law is not immune to technological advances, especially in the areas of research methodologies and, of course, electronic discovery.
Mobile Mayhem: Smartphones and Security (Or the Lack Thereof)
November 30, 2015
A company that cares at all about its data needs to stay abreast of the security risks mobile devices engender. There are many ways to combine policy and technology in ways that address these risks ' at least by identifying them and adapting appropriately.
Movers & Shakers
November 29, 2015
A Collection of Moves in the Cybersecurity and Privacy Practice Areas
<b><i>Online Extra:</b></i> Cyber Attacks Demand Rapid Response, ACC Panel Says
November 02, 2015
Be ready and act fast. That's the advice a panel on cybersecurity attacks at the Association of Corporate Counsel's annual meeting last month told in-house lawyers.
<b><i>Online Extra:</b></i> Millennials Distrust Data Protection Methods Employed By Common Online Services: Study
November 02, 2015
As digital natives, millennials have a major stake in how information is stored and protected by the organizations they share it with. But despite having contributed a vast amount of data to the global ecosystem (in some cases since before they could walk), it turns out that members of Gen Y feel that businesses and government organizations fail to meet their expectations when is comes cybersecurity.
Safe Harbor European Court Data Protection Ruling
November 02, 2015
On Oct. 6 of this year, the European Court of Justice (ECJ) gave a very important judgment about EU data protection law in the so-called Schrems case, where it ruled that the EU Safe Harbor regime is invalid and that EU Member State data protection regulators have the power to investigate complaints about the adequacy of the level of protection of data transfers to the U.S.
Heightened Cybersecurity Concerns Impact IP Strategies
November 02, 2015
Recent widely reported cybersecurity breaches have further heightened awareness of the issue, which is of significantly increasing concern both to businesses and government. Government regulators have pressed for greater cybersecurity efforts ' with the FTC's authority in this area being recently upheld by the Third Circuit.
SEC Potentially Targets CCOs for Cybersecurity Lapses
November 02, 2015
Two recent speeches by Securities and Exchange Commission (SEC) officials likely got the attention of every Chief Compliance Officer (CCO). CCOs would be well advised to carefully review and implement where appropriate the SEC's latest cybersecurity guidance.
Four Keys to Litigation Technology Innovation in the Next Five Years
November 02, 2015
Electronic discovery is a complex business that requires continuous professional learning from litigation team members and ongoing innovation from technology solution providers. To help stimulate discussion and drive innovation, The Legal Innovation 2020 Working Group was formed at the beginning of 2015 in order to help legal-industry leaders identify the keys to success over the next five years.
The Art of Cyberwarfare
November 02, 2015
Cybersecurity is at a crossroads. No longer resigned to the confines of server rooms overseen by information technology, decisions regarding the protection of data have been forced into the boardroom by events that include breaches at main street businesses and revelations of clandestine government hacking activities.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Anti-Assignment Override Provisions
    UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›