Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,223 results for "Cybersecurity Law & Strategy"...

Deritivative Cyber Litigation
May 02, 2015
Potential liability for data breaches has emerged as a major concern for businesses in the past few years as massive cyber-attacks are increasing, with companies that use or store private customer data electronically or use social media as part of their marketing strategy being the prime targets.
Disputes over Insurance Coverage for Alleged TCPA Violations
May 02, 2015
During the past several years, there has been an increase in the number of lawsuits that allege violations of the Telephone Consumer Protection Act ("TCPA"), and a corresponding increase in the number of coverage disputes over TCPA liabilities.
Securing a Document Review Center: A Practical Guide
May 02, 2015
Much ink has been spilled in recent years about information security, hacker exploits and hardware and software products used to thwart hackers. Not a single day goes by without news pertaining to the discovery of vulnerabilities in the software we use and cherish, and to hacker exploits affecting the companies we use in our daily lives.
Cybercrime
May 02, 2015
Just when you thought that it could not get worse for companies in the context of cybersecurity and privacy issues ' it does. Below, we review the sobering news about cyberattacks and provide some tips when considering insurance for cyber risk.
<b><i>Online Extra:</b></i> DOJ Releases Cybersecurity Best Practices
May 01, 2015
Dealing with cybersecurity in the United States is challenging for many reasons, but one of the most frequently cited pain points is the patchwork of laws governing the space. Depending on your corporation's industry, consumer base and location, your legal requirements following a significant breach can change dramatically. The Department of Justice (DOJ) is now stepping up to help, setting a list of best practices organizations should bear in mind if and when they are&#133;
<b><i>Online Extra:</b></i> Up to Senate to Vote on Cybersecurity Legislation
April 30, 2015
Following the recent approval by the House of Representatives of two controversial cybersecurity bills, it is now up to the Senate to move forward on its proposal, which would encourage the sharing of cyberthreat information.
Third Circuit Weighs Novel Cybersecurity Case
April 02, 2015
Five years ago, Russian hackers broke into the Wyndham Hotels computer network and stole the credit card information for thousands of customers, a security breach that has now put the novel question of whether the FTC can sue a company for failing to properly secure its data in front of the Third Circuit.
You First: Manufacturing, IP, and the Coming 3D Printing Disruption
April 02, 2015
Like it or not, the manufacturing industry looks like it will be first in line to feel the potential transformative impact of 3D printing or additive manufacturing. At the same time, changes in intellectual property (IP) law unrelated to 3D printing will impact the disruption in manufacturing.
The Internet User's Duty of Care
April 02, 2015
The duty one Internet user has to another has changed, particularly with respect to cybersecurity and privacy. Negligence by Internet users has enabled hackers and creators of viruses to exploit computer systems and engage in crime and unwanted computer intrusions.
Best Practices for Law Firms to Meet Cybersecurity Requirements of Inside Counsel
April 02, 2015
Whether or not your clients have suffered a data breach, cybersecurity is undoubtedly a critical concern. Many of your clients are actively searching for and plugging any gaps in their security. And if your clients haven't done so already, they're also going to focus their attention on what could potentially be an Achilles Heel for them ' their law firms.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Anti-Assignment Override Provisions
    UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›