Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,223 results for "Cybersecurity Law & Strategy"...

Three Lessons for a Proactive Approach To Cybersecurity
August 02, 2015
Do you know where your client's or organization's data is? It's not a rhetorical question ' it's a serious issue that should be at the core of any cybersecurity assessment.
Sensitive Data Loss is Not Inevitable
July 02, 2015
Global banking institutions are increasingly pressing outside law firms to demonstrate they are employing top-tier technologies to defend against cyber hackers. In some cases, firms are being asked to fill out 60-page questionnaires detailing their cybersecurity measures in minute detail, while others must consent to on-site inspections.
Get a (Law) Firm Grip on Data Breaches
July 02, 2015
This article describes some of the reasons law firms are cyber-attack targets, steps they can take to reduce their risk, and what clients are doing to encourage law firms in those efforts.
Derivative Cyber Litigation
July 02, 2015
Potential liability for data breaches has emerged as a major concern for businesses in the past few years as massive cyber-attacks are increasing, with companies that use or store private customer data electronically or use social media as part of their marketing strategy being the prime targets. These data breaches have contributed to an increase in director and officer (D&O) litigation in connection with cyber incidents, and will continue to do so.
Get a (Law) Firm Grip on Data Breaches
June 02, 2015
Law firms are as much at risk for cyber attacks as any other industry. Because of the lack of reporting requirements in the industry, it is unclear how many breaches have actually occurred. This article describes some of the reasons law firms are cyber-attack targets, steps they can take to reduce their risk, and what clients are doing to encourage law firms in those efforts.
Get a (Law) Firm Grip on Data Breaches
June 02, 2015
Law firms are as much at risk for cyber attacks as any other industry. Because of the lack of reporting requirements in the industry, it is unclear how many breaches have actually occurred. Fortunately, law firms are now recognizing the risk and beginning to take preventive action. This article describes some of the reasons law firms are cyber-attack targets, steps they can take to reduce their risk, and what clients are doing to encourage law firms in those efforts.
Cybersecurity Lawyers Getting Plenty of Company
June 02, 2015
High-profile data breaches in the past few years have been a wakeup call for corporate America ' and made cybersecurity and data privacy the next "it" practice for lawyers. There's been a gold rush to the field, practitioners say ' and the potential rewards have attracted some Johnny-come-latelies and pushed attorneys to seek out new ways of distinguishing themselves as experts.
<b><i>Online Extra:</b></i> FTC Sued Over Refusal to Disclose Data Security Policies
May 28, 2015
' The Federal Trade Commission (FTC) was sued last month for refusing to turn over information about how the agency decides to bring data security cases. The Freedom of Information Act suit by Philip Reitinger, a former Department of Homeland Security official who is now president of a cybersecurity company, comes as the FTC'defends its role as data security cop'in two ongoing cases. &#133;
<b><i>Online Extra:</b></i> Data Breaches on Track to Cost Companies $2.1 Trillion
May 28, 2015
As more corporate infrastructure moves online, new research suggests the rising number and impact of data breaches will cost $2.1 trillion globally by 2019, almost four times the estimated cost of breaches in 2015.
The Internet User's Duty of Care
May 02, 2015
The duty one Internet user has to another has changed, particularly with respect to cyber-security and privacy. Negligence by Internet users has enabled hackers and creators of viruses to exploit computer systems and engage in crime and unwanted computer intrusions.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Anti-Assignment Override Provisions
    UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›