Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,223 results for "Cybersecurity Law & Strategy"...

Fed. Judge Says FTC Can Sue over Poor Data Security
May 02, 2014
In a case being closely watched by general counsel, a federal judge ruled last month that the FTC has the authority to take legal action against companies that have faulty security practices for consumer data.
The Human Factor in Data Security
May 02, 2014
While high-profile targeted cyberattacks received great attention in 2013, data breaches due to human error continue to be a regular occurrence. The good news, such as it is, is that today, more attention is focused on combatting cyber threats than ever before.
Law Firms' Prime Data Security Threat Is Their Own Employees
April 02, 2014
From kill commands and encryption codes to government espionage and foreign hackers, law firm life is beginning to resemble the plot line of a spy thriller.
White House Uploads U.S. Cybersecurity Framework
February 28, 2014
President Barack Obama's administration on Feb. 12 released its much-anticipated voluntary cybersecurity framework, giving U.S. companies a common handbook on how they can try to fend off hackers.
Forced Decryption in Government Investigations
February 26, 2014
In the wake of the Snowden leaks, makers of encryption products can expect a strong uptick in demand, as encryption will likely become even more widely used.
U.S. Releases Draft Cybersecurity Framework
November 02, 2013
The U.S. Department of Commerce's National Institute of Standards and Technology (NIST) released its draft of a voluntary cybersecurity framework on Oct. 22 that will allow both private and public companies that work with critical infrastructure to better evaluate cyber risk, and prepare better defenses against ever-increasing online attacks.
e-Commerce News
November 02, 2013
Google Beats Web Browser Privacy Class Action<br>Washington University Debuts Cybersecurity Master's Program
Nine Key Steps In a Proactive Cybersecurity Review
October 02, 2013
Securing your company's network and protecting your valuable data is difficult enough in today's Internet-driven economy. But to be treated by regulators and courts like an accessory to the crime after you've been hacked is truly adding insult to injury.
FTC Expanding Its Role in 'Internet of Things' Security
October 02, 2013
The FTC continued to expand its reach into cybersecurity last month when it took legal action against TRENDnet, which markets Web-connected home security cameras that allowed hundreds of live video feeds to be hacked and posted online.
<b><i>Online Extra</b></i>White House Offers Incentives for Cybersecurity Program
September 02, 2013
President Barack Obama's administration has drafted a potential recipe for sweetening its voluntary corporate cybersecurity program. The program is under development at the White House and is aimed at utility companies and other businesses that are key to U.S. infrastructure.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Anti-Assignment Override Provisions
    UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›