Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,291 results for "Cybersecurity Law & Strategy"...

<b><i>Online Extra:</b></i> Premera Data Breach Compromises Up to 11 Million Users' Records
March 30, 2015
Over the last year, cyberbreaches targeting health care and insurance companies have made headlines almost as frequently as those of large well-established business. Due to the sensitive material collected by companies in the health care space, companies in this industry are a particularly attractive target to cybercriminals and painful for organizations and their customers.
<b><i>Online Extra:</b></i> Law Firms to Form Cybersecurity Alliance
March 30, 2015
As pressure to strengthen defenses against security breaches increases, at least five Am Law 100 and Magic Circle firms are working to form an alliance that would allow them to ultimately share information with each other about cyber threats and vulnerability.
Cybersecurity Practices Booming In Era of the Breach
February 28, 2015
The cybersecurity woes of companies like Target and Sony in 2014 and Anthem last month have meant a busy start to 2015 for law firm data-privacy and security practices.
Law Firms Aren't Immune to Cybersecurity Risks
February 28, 2015
Although law firms have managed to remain off the list of the year's biggest data breach victims, firms watching cybersecurity trends most closely are feeling increasingly uneasy about their own security posture.
Cybercrime
February 28, 2015
Just when you thought that it could not get worse for companies in the context of cybersecurity and privacy issues ' it does. Distributed denial of service attacks (DDoS) are also on the rise. This article reviews the sobering news about cyberattacks and provides some tips when considering insurance for cyber risk in 2015.
Obama Calls for Industry's Cooperation On Cybersecurity
February 28, 2015
President Barack Obama signed an executive order on Feb. 13 promoting information-sharing between the private sector and the government in an effort to combat the rising number of security hacks and data breaches.
Data Security Breaches
February 28, 2015
In April 2014, the U.S. District Court for the District of New Jersey decided that the FTC could pursue a claim that a hotel company's failure to have adequate data security measures is an unfair trade practice. The agency believes that data security is a basic responsibility of any company that accepts consumer personal information.
<b><i>Online Extra</b></i> Turning Cybersecurity Into a Serious 'Game of Threats'
February 02, 2015
The last few years have seen some creative new methods of getting businesses engaged in protecting their networks and data. PricewaterhouseCoopers has created a cybersecurity computer game. PwC's 'Game of Threats' walks businesspeople, playing either as a team of nefarious hackers or as a company being attacked, through the important decisions they have to make during a breach, in hopes of giving them a deeper knowledge of cybersecurity and its challenges.
Can Computers Practice Law?
January 31, 2015
Can computers practice law? Many are inclined to say yes when using them affects us in so many ways. When scanning the pages of LJN's Legal Tech Newsletter , we learn a good deal about the use of computers in the practice of law, but what I am really asking here is how far can ' or will ' we go to automate dispute resolution?
The Internet of (Legal) Things
January 31, 2015
Welcome to the "Internet of Things" (IoT) ' the Web of embedded computing devices that interact with our everyday lives. Like any technology revolution, those devices have no interest in waiting for the legal world to catch up. As a result, if a General Counsel's wearable device measuring nighttime biorhythms does not keep her awake at night, the prospect of billions of devices sensing everything about her customers and employees during an era of cyber insecurity probably will.

MOST POPULAR STORIES

  • Surveys in Patent Infringement Litigation: The Next Frontier
    Most experienced intellectual property attorneys understand the significant role surveys play in trademark infringement and other Lanham Act cases, but relatively few are likely to have considered the use of such research in patent infringement matters. That could soon change in light of the recent admission of a survey into evidence in <i>Applera Corporation, et al. v. MJ Research, Inc., et al.</i>, No. 3:98cv1201 (D. Conn. Aug. 26, 2005). The survey evidence, which showed that 96% of the defendant's customers used its products to perform a patented process, was admitted as evidence in support of a claim of inducement to infringe. The court admitted the survey into evidence over various objections by the defendant, who had argued that the inducement claim could not be proven without the survey.
    Read More ›
  • A Playbook for Disrupting Traditional CRM
    Here's the playbook for disruption: Take attorneys out of the equation. Stop building CRM that succeeds or fails on their shoulders. We need to shift the focus and, instead, build the technology from the ground up for the professionals who actually use it: marketing and business development.
    Read More ›