Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,223 results for "Cybersecurity Law & Strategy"...

The Case for the GC
April 02, 2015
In a time of increasing regulatory risk, global complexity and shareholder activism, the role of the corporate general counsel in the boardroom has never been more important. Yet, companies have been slow to recruit general counsels or seasoned attorneys to serve as independent directors.
Movers & Shakers
March 30, 2015
A Collection of Moves in the Cybersecurity and Privacy Practice Areas
<b><i>Online Extra:</b></i> Premera Data Breach Compromises Up to 11 Million Users' Records
March 30, 2015
Over the last year, cyberbreaches targeting health care and insurance companies have made headlines almost as frequently as those of large well-established business. Due to the sensitive material collected by companies in the health care space, companies in this industry are a particularly attractive target to cybercriminals and painful for organizations and their customers.
<b><i>Online Extra:</b></i> Law Firms to Form Cybersecurity Alliance
March 30, 2015
As pressure to strengthen defenses against security breaches increases, at least five Am Law 100 and Magic Circle firms are working to form an alliance that would allow them to ultimately share information with each other about cyber threats and vulnerability.
Cybersecurity Practices Booming In Era of the Breach
February 28, 2015
The cybersecurity woes of companies like Target and Sony in 2014 and Anthem last month have meant a busy start to 2015 for law firm data-privacy and security practices.
Law Firms Aren't Immune to Cybersecurity Risks
February 28, 2015
Although law firms have managed to remain off the list of the year's biggest data breach victims, firms watching cybersecurity trends most closely are feeling increasingly uneasy about their own security posture.
Cybercrime
February 28, 2015
Just when you thought that it could not get worse for companies in the context of cybersecurity and privacy issues ' it does. Distributed denial of service attacks (DDoS) are also on the rise. This article reviews the sobering news about cyberattacks and provides some tips when considering insurance for cyber risk in 2015.
Obama Calls for Industry's Cooperation On Cybersecurity
February 28, 2015
President Barack Obama signed an executive order on Feb. 13 promoting information-sharing between the private sector and the government in an effort to combat the rising number of security hacks and data breaches.
Data Security Breaches
February 28, 2015
In April 2014, the U.S. District Court for the District of New Jersey decided that the FTC could pursue a claim that a hotel company's failure to have adequate data security measures is an unfair trade practice. The agency believes that data security is a basic responsibility of any company that accepts consumer personal information.
<b><i>Online Extra</b></i> Turning Cybersecurity Into a Serious 'Game of Threats'
February 02, 2015
The last few years have seen some creative new methods of getting businesses engaged in protecting their networks and data. PricewaterhouseCoopers has created a cybersecurity computer game. PwC's 'Game of Threats' walks businesspeople, playing either as a team of nefarious hackers or as a company being attacked, through the important decisions they have to make during a breach, in hopes of giving them a deeper knowledge of cybersecurity and its challenges.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Anti-Assignment Override Provisions
    UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›