Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,223 results for "Cybersecurity Law & Strategy"...

California's Latest Privacy Rulemaking Proposes Further Obligations for Businesses  
August 01, 2022
While the the California Privacy Protection Agency kicked some of the more difficult issues down the road for further consideration, its first draft of proposed Regs is quite comprehensive with respect to the issues addressed. The authority for some of what is proposed is questionable and will likely be challenged in comments, if not judicial action, if such provisions become final.
Proactively Tackling Unstructured Data Can Give Competitive Advantage
August 01, 2022
Unstructured data comprises 80% of total data volume for legal organizations, which means that on average, only one-fifth of the entirety of the data set is properly secured and actively managed. Although some believe that ignoring unstructured data establishes plausible deniability that relinquishes them from culpability when a breach occurs, it's an untenable position from both a regulatory and brand reputational perspective.
Cloud-Based Discovery Is at Critical Mass: A Practical Approach
August 01, 2022
Part Two of a Two-Part Series Cloud technology use in discovery is inevitable. Fortunately, one of the inherent benefits of cloud discovery platforms is the ability to spin up a proof of concept matter quickly to get your feet wet. This article provides a practical approach to making sure you're ready for the cloud when the time comes.
Online Accessibility and SEO
August 01, 2022
How can you make your user experience the best it can be for all potential clients, and lead with empathy and equity as you demonstrate your knowledge? That's where your law firm's SEO strategy comes into play.
Traditional Legal Ops Putting Law Firms At Disadvantage When Recruiting for Cybersecurity and Privacy
August 01, 2022
Law firms are still insisting on engaging with clients in the traditional legal model — by hours billed. Whereas cybersecurity services such as breach monitoring have the potential for a much deeper and stickier relationship with the client.
Dealing With Deleted, Unsent and Edited ESI 
August 01, 2022
While text messages and email have the appearance of reliability, technological advances have, over time, rendered many digital communications less static and more open to manipulation.
White-Collar Enforcement Under the Biden Administration
August 01, 2022
After much saber-rattling, the Biden administration's focus on white-collar corporate compliance is finally coming into focus. Law firms and white-collar compliance experts have long warned the administration's ramped-up focus was coming, but the pandemic largely nixed any initiatives. A spate of recent settlements coupled with the addition of a new white-collar leader at the U.S. Department of Justice is giving the public a look into what compliance will look like under Biden.
How to Manage 6 Risks Affecting Cybersecurity for Law Firms
August 01, 2022
Cybercriminals are increasingly targeting law firms; extortion is quickly realized, given the nature of highly confidential client data. The digital footprint of law firms is constantly expanding, leading to more entrances to a firm's network infrastructure, which is a direct gateway to data.
6 Risks Affecting Cybersecurity for Law Firms
August 01, 2022
We are all "custodians of data." Law firms specifically are stewards of some of the most sensitive information stored and shared; a fact that doesn't elude nefarious cybercriminal syndicates. Below are some of the top cybersecurity risks affecting law firms.
DOJ NFT Insider Trading Indictment Skirts Securities Question, But Litigates Like It Is
August 01, 2022
The question of whether an NFT is a security has come up several times, and United States of America v. Chastain in the Southern District of New York brings the dispute back to the forefront.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • "Holy Fair Use, Batman": Copyright, Fair Use and the Dark Knight
    The copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›