Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,258 results for "Cybersecurity Law & Strategy"...

Wyndham Settles FTC Data Breach Suit
December 31, 2015
Being a test case can make you a hero, your name immortalized in case cites as you bask in amici gratitude.
Mobile Mayhem: Smartphones and Security (Or the Lack Thereof)
December 31, 2015
BYOD implementation can come in a wide variety of different formulations, but it essentially means that employees are choosing their own hardware and, to one degree or another, mixing personal and business use on a device. This means personal devices with no control from employers other than perhaps some unmonitored, unenforced, and mostly unread policy guidance.
Prioritizing e-Mail Security in the Legal Sector
November 30, 2015
Data breaches and cyberattacks aren't new occurrences, but it can sometimes feel like they are. It's only in the last few years that we've seen these attacks make headlines more and more, increasing in both quantity and impact.
CISA Passes: What It Means for Organizations and Their Data
November 30, 2015
The Cybersecurity Information Sharing Act (CISA) was passed by the Senate on Oct. 27, and while it still has a few hoops to jump through before it is enacted into law, the hotly debated proposed rules may considerably impact both those organizations holding sensitive data and the users to which that data belongs.
'Internet of Things' Litigation and Regulatory Risk
November 30, 2015
Most lawyers have heard of the "Internet of Things." Business leaders, after all, are busy making the Internet of Things (IoT) the next great wave of innovation to sweep across the global economy. Apple, AT&T, Cisco, General Electric, Google, Honeywell, Intel, Microsoft, Oracle, Panasonic, Samsung, and scores of others have been investing in the IoT for years. With current predictions of a $15 trillion IoT market in fewer than 10 years, it is easy to understand why so many industry giants have made the IoT a strategic priority.
Training Tomorrow's Lawyer
November 30, 2015
There's math and technology involved? Count me out, that's why I went to law school." The attorneys in the room nod at each other, smiling at this joke that more than a few of us have told at one point in our careers. But it looks like this joke has finally run its course. The practice of law is not immune to technological advances, especially in the areas of research methodologies and, of course, electronic discovery.
Mobile Mayhem: Smartphones and Security (Or the Lack Thereof)
November 30, 2015
A company that cares at all about its data needs to stay abreast of the security risks mobile devices engender. There are many ways to combine policy and technology in ways that address these risks ' at least by identifying them and adapting appropriately.
Movers & Shakers
November 29, 2015
A Collection of Moves in the Cybersecurity and Privacy Practice Areas
<b><i>Online Extra:</b></i> Cyber Attacks Demand Rapid Response, ACC Panel Says
November 02, 2015
Be ready and act fast. That's the advice a panel on cybersecurity attacks at the Association of Corporate Counsel's annual meeting last month told in-house lawyers.
<b><i>Online Extra:</b></i> Millennials Distrust Data Protection Methods Employed By Common Online Services: Study
November 02, 2015
As digital natives, millennials have a major stake in how information is stored and protected by the organizations they share it with. But despite having contributed a vast amount of data to the global ecosystem (in some cases since before they could walk), it turns out that members of Gen Y feel that businesses and government organizations fail to meet their expectations when is comes cybersecurity.

MOST POPULAR STORIES