Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,291 results for "Cybersecurity Law & Strategy"...

Law Firms and Cyber Security
July 30, 2012
Just as those responsible for the Titanic were lulled into a false sense of confidence in the vessel's impenetrability, many law firms today similarly steam along with a false sense of security that the cybercrime lurking in today's electronic channels of commerce does not pose a potentially critical threat. Taking a lesson from history, firms would be well-served by a blunt assessment of the cyber security risks that surround them and whether course corrections could avert a modern-day commercial disaster.
'Hot' and 'Cold' Trends
July 27, 2012
Surviving in the "new normal" requires recognizing both "hot" and "cold" trends. Here is a look at significant trends affecting law firms.
Digital Copiers Don't Forget
May 29, 2012
Risk mitigation requires a good understanding of where the vulnerabilities are, and one that many companies have missed is the sensitive data that likely reside in the hard drive memories of printers, copiers, and fax machines.
Law Firms and Cyber Security
May 29, 2012
Many law firms today steam along with a false sense of security that the cybercrime lurking in today's electronic channels of commerce does not pose a potentially critical threat. They are wrong.
Digital Copiers Don't Forget
April 29, 2012
The measures discussed in this article can help organizations to manage the risks associated with operating in the digital environment. This is important because, in 2012, ignorance of what your copier remembers is no longer a defense.
SOPA Update
December 27, 2011
On Dec. 15 and 16, just as Congress was preparing to go dark until after the New Year, The U.S. House of Representatives Committee on the Judiciary held hearings on SOPA. And what seemed destined to be a long drawn-out fight by a few in attendance who were in opposition of passing the Bill against Committee Chairman and sponsor Lamar Smith (R-TX) and its many supporters, took a bizarre and sudden turn as Day 2 restarted after lunch ' and maybe more importantly, as Representatives' flights home for recess were in danger of being missed.
Computer Fraud and Abuse Act: Finding the Line in the Sand
July 29, 2011
The scope of the CFAA is the subject of an emerging split among federal courts of appeals as highlighted by a recent opinion by the U.S. Court of Appeals for the Ninth Circuit, which rejected the claim that its decision would make criminals out of millions of employees who might utilize their work computers for personal use.
<b><i>Commentary:</b></i> Cybersecurity Needs Public Notice
May 27, 2010
There is an important debate unfolding across government and the private sector over a critical national security issue: how to secure America's information networks from cybersabotage, espionage and attacks. Congress, the executive branch and the private sector must all do a better job of engaging the public on decisions that are so important.
Law Firms Slow To Awaken to Cybersecurity Threats
March 29, 2010
Law firms have been targeted by a sophisticated network of overseas hackers looking to infiltrate computer systems in order to gather data or monitor attorney activity, according to attorneys and technology experts. Law firms have dealt quietly with cyberattacks for years, but lately those strikes appear to be on the rise.
Are Web Applications a Security Concern?
July 29, 2009
Private companies with external Web sites can be susceptible to attackers looking to commit defacement or infiltrate computer networks to steal sensitive information. Here's what you need to know.

MOST POPULAR STORIES

  • Surveys in Patent Infringement Litigation: The Next Frontier
    Most experienced intellectual property attorneys understand the significant role surveys play in trademark infringement and other Lanham Act cases, but relatively few are likely to have considered the use of such research in patent infringement matters. That could soon change in light of the recent admission of a survey into evidence in <i>Applera Corporation, et al. v. MJ Research, Inc., et al.</i>, No. 3:98cv1201 (D. Conn. Aug. 26, 2005). The survey evidence, which showed that 96% of the defendant's customers used its products to perform a patented process, was admitted as evidence in support of a claim of inducement to infringe. The court admitted the survey into evidence over various objections by the defendant, who had argued that the inducement claim could not be proven without the survey.
    Read More ›
  • A Playbook for Disrupting Traditional CRM
    Here's the playbook for disruption: Take attorneys out of the equation. Stop building CRM that succeeds or fails on their shoulders. We need to shift the focus and, instead, build the technology from the ground up for the professionals who actually use it: marketing and business development.
    Read More ›