Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,223 results for "Cybersecurity Law & Strategy"...

U.S. Cybersecurity's Path from Legislative Debate to Executive Action
August 30, 2012
That some action is needed in the realm of cybersecurity is the one thing beyond debate. Over the last year, supporters of various versions of legislation have emphasized that the nation's critical infrastructure ' including electrical grids, water stations and telecommunications systems ' is a target for cyber-attacks.
20/20 Vision for All Lawyers' Future: The Ethical Duty to Stay Technically Competent
August 30, 2012
How many practicing lawyers today (at least those over the age of 40) studied metadata and data security in law school? How many today can discuss the ethical aspects of those issues? Those skills, and more, are required to practice law, according to resolutions passed in early August by the ABA House of Delegates.
Law Firms and Cyber Security
July 30, 2012
Just as those responsible for the Titanic were lulled into a false sense of confidence in the vessel's impenetrability, many law firms today similarly steam along with a false sense of security that the cybercrime lurking in today's electronic channels of commerce does not pose a potentially critical threat. Taking a lesson from history, firms would be well-served by a blunt assessment of the cyber security risks that surround them and whether course corrections could avert a modern-day commercial disaster.
'Hot' and 'Cold' Trends
July 27, 2012
Surviving in the "new normal" requires recognizing both "hot" and "cold" trends. Here is a look at significant trends affecting law firms.
Digital Copiers Don't Forget
May 29, 2012
Risk mitigation requires a good understanding of where the vulnerabilities are, and one that many companies have missed is the sensitive data that likely reside in the hard drive memories of printers, copiers, and fax machines.
Law Firms and Cyber Security
May 29, 2012
Many law firms today steam along with a false sense of security that the cybercrime lurking in today's electronic channels of commerce does not pose a potentially critical threat. They are wrong.
Digital Copiers Don't Forget
April 29, 2012
The measures discussed in this article can help organizations to manage the risks associated with operating in the digital environment. This is important because, in 2012, ignorance of what your copier remembers is no longer a defense.
SOPA Update
December 27, 2011
On Dec. 15 and 16, just as Congress was preparing to go dark until after the New Year, The U.S. House of Representatives Committee on the Judiciary held hearings on SOPA. And what seemed destined to be a long drawn-out fight by a few in attendance who were in opposition of passing the Bill against Committee Chairman and sponsor Lamar Smith (R-TX) and its many supporters, took a bizarre and sudden turn as Day 2 restarted after lunch ' and maybe more importantly, as Representatives' flights home for recess were in danger of being missed.
Computer Fraud and Abuse Act: Finding the Line in the Sand
July 29, 2011
The scope of the CFAA is the subject of an emerging split among federal courts of appeals as highlighted by a recent opinion by the U.S. Court of Appeals for the Ninth Circuit, which rejected the claim that its decision would make criminals out of millions of employees who might utilize their work computers for personal use.
<b><i>Commentary:</b></i> Cybersecurity Needs Public Notice
May 27, 2010
There is an important debate unfolding across government and the private sector over a critical national security issue: how to secure America's information networks from cybersabotage, espionage and attacks. Congress, the executive branch and the private sector must all do a better job of engaging the public on decisions that are so important.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Anti-Assignment Override Provisions
    UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›