Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,223 results for "Cybersecurity Law & Strategy"...

Hot and Cold Trends
August 27, 2013
There are certain practice areas, trends and issues that are hot or, if they are cold right now, could be harbingers of things to some. These are the most significant ones that firms should watch on their radar screens.
Should Lying About Your Age Online Be a Federal Crime?
May 31, 2013
The calls for amending the Computer Fraud and Abuse Act (CFAA) have grown louder. In response, several bills have been introduced in Congress offering amendments to the CFAA. The question is whether Congress will use this opportunity to draft a law that attempts to reflect the interests of all U.S. citizens or simply increase the criminal penalties for violating the CFAA so as to appear tough on crime.
LegalVIEW Data Shows Litigation Up, Legal Spend Down
May 24, 2013
The two hottest litigation areas these days are wage-and-hour and regulatory/compliance cases. But that isn't translating into more legal spending by corporate law departments.
Cyberinsurance: Making the Policy Fit
May 02, 2013
It seems that everyone these days, from President Obama to Facebook account holders, is concerned about cybersecurity. Data breaches and cyberintrusions are front page news, and businesses are warned to take a 'when, not if' approach to these threats.
Insurance Coverage for Cyber Attacks
April 29, 2013
Companies should carefully examine their insurance programs, evaluate what coverage already may be available, and see what may be done to enhance the available coverage. To the extent that there may be gaps in available coverage, companies should consider how those gaps can be filled, including through specialty "cyber" risk policies.
<b><i>Online Exclusive</b></i> Controversial Cybersecurity Bill Passes in House
April 24, 2013
Congress is once again pushing forward on a controversial bill to bolster the nation's cybersecurity, which could end up changing how law firms and their clients respond to online threats. The House passed the Cyber Intelligence Sharing and Protection Act (CISPA) on April 18, sending the legislation to the Senate. The bill would allow 'cybersecurity entities' ' an intentionally broad term that includes law firms and business that they represent ' to share cyber threat information'
Cybersecurity Report Spotlights Risks to U.S. Business from China
February 28, 2013
Mandiant, a Virginia-based cybersecurity firm, gave America a wake-up slap across the face last month by detailing how Chinese military hackers are infiltrating U.S. companies. And on Feb. 20, President Barack Obama's administration responded by announcing a broad plan to fight the cyber theft of trade secrets that included diplomatic pressure to discourage it.
Cybersecurity Legislation Near
December 27, 2012
On Nov. 15, the U.S. Senate declined to approve S. 3414, the Cybersecurity Act of 2012. The proposed legislation would have set voluntary cybersecurity standards for owners of the nation's critical infrastructure, such as gas pipelines, utilities and banks. In the absence of cybersecurity legislation, the Obama administration now is considering taking action through an executive order.
An Analysis of Proposed Federal Cybersecurity Legislation
October 31, 2012
Michael Chertoff, the former head of the U.S. Department of Homeland Security (DHS), recently remarked that "cyber threats represent one of the most seriously disruptive challenges to national security since the onset of the nuclear age 60 years ago."
Cybersecurity Law Firms Needed to Combat Terrorism Threat
October 31, 2012
The next mass terrorism attack may not involve planes, trains or buildings. It very well may involve cyberspace and could be felt by Americans when their lights, computers or smart phones go on the fritz as networks are compromised.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Anti-Assignment Override Provisions
    UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›