Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,291 results for "Cybersecurity Law & Strategy"...

<b><i>Online Extra</b></i> Facing a Breach, UPS Delivers Smart Cybersecurity Moves
August 28, 2014
United Parcel Service Inc. announced on Aug. 22 that it had suffered a data breach exposing customer information, but the unusual part of the news was that it caught and held the breach to just 1 percent of its stores nationwide, affecting about 105,000 customers.
Is It a 'Cyberattack' or a 'Data-Breach Incident'?
August 02, 2014
This article goes beyond the nuts and bolts of how to respond to a data-breach incident, and offers some lessons learned from the frontlines of the cybersecurity war to help companies successfully navigate the legal and public-relations minefield that ensues.
Planning a Merger?
August 02, 2014
A successful merger should improve the firm's competitive position and add value for your clients ' due diligence is key to that success.
Protecting Law Firms from Increasing Cyberattacks
July 02, 2014
Cyberattacks are increasing at a startling rate in the business community, not only by hackers for personal intellectual skullduggery, but cyberattacks aimed at obtaining sensitive information. Law firms have become major targets of these illegal attacks, which are aimed at discovering and pilfering the entire subject matter of a commercial operation.
Planning a Merger? Avoid Pitfalls through Proper Due Diligence
July 02, 2014
After reaching an all-time high in 2013, the pace of U.S. law firm mergers and acquisitions is showing no signs of slowing down. With all of these deals in the news of late, you may be considering whether a merger or acquisition might be an appropriate growth strategy for your firm.
The State of U.S. Cybersecurity: Not So Good
July 02, 2014
Every day brings new national headlines about a cyberattack, an alarming trend. The latest iteration of an annual report shows that these growing concerns have not necessarily translated into developing and deploying the proper defensive capabilities.
Paper's Hidden Security Risk
June 02, 2014
It is almost impossible to open a newspaper today without reading about cybersecurity breaches. Target Corp., Neimann Marcus and many other companies have been targeted, and many experts think it is only a matter of time until law firms are targeted (if it's not too late already). All this "cyber risk" may have you pining for the days before computers, when almost all information was stored on paper.
Coping with Evolving Cybersecurity Rules
June 02, 2014
Cybersecurity and data protection, more than ever, are priority items for the government and private sector. The government has reacted by proposing legislative "fixes" that would require organizations to satisfy basic levels of cybersecurity protection and disclose breaches or face fines. Whether a mandatory compliance model will be effective given the rapid pace by which technology advances is unclear. It may be unrealistic to expect the government's legislative pace to keep up with hackers.
Fed. Judge Says FTC Can Sue over Poor Data Security
May 02, 2014
In a case being closely watched by general counsel, a federal judge ruled last month that the FTC has the authority to take legal action against companies that have faulty security practices for consumer data.
The Human Factor in Data Security
May 02, 2014
While high-profile targeted cyberattacks received great attention in 2013, data breaches due to human error continue to be a regular occurrence. The good news, such as it is, is that today, more attention is focused on combatting cyber threats than ever before.

MOST POPULAR STORIES

  • Surveys in Patent Infringement Litigation: The Next Frontier
    Most experienced intellectual property attorneys understand the significant role surveys play in trademark infringement and other Lanham Act cases, but relatively few are likely to have considered the use of such research in patent infringement matters. That could soon change in light of the recent admission of a survey into evidence in <i>Applera Corporation, et al. v. MJ Research, Inc., et al.</i>, No. 3:98cv1201 (D. Conn. Aug. 26, 2005). The survey evidence, which showed that 96% of the defendant's customers used its products to perform a patented process, was admitted as evidence in support of a claim of inducement to infringe. The court admitted the survey into evidence over various objections by the defendant, who had argued that the inducement claim could not be proven without the survey.
    Read More ›
  • A Playbook for Disrupting Traditional CRM
    Here's the playbook for disruption: Take attorneys out of the equation. Stop building CRM that succeeds or fails on their shoulders. We need to shift the focus and, instead, build the technology from the ground up for the professionals who actually use it: marketing and business development.
    Read More ›