Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,302 results for "Cybersecurity Law & Strategy"...

Innovating Hybrid: Empathy and Iteration
January 01, 2023
Recognizing that this is a time of innovation, one way law firms can 'prepare for a future we can't yet see' is through leveraging two key levers: the need for empathy and iteration.
What's In Store for the Blockchain Industry In 2023?
January 01, 2023
The FTX bankruptcy caps a very difficult 2022 for the entire blockchain industry, spanning exchanges to decentralized finance to non-fungible tokens (NFTs). Blockchain and crypto skeptics are shouting "I told you so," while investors watch billions of investment dollars evaporate under the harsh light of the bankruptcies of Celsius, Compute North and now FTX.
Players On the Move
January 01, 2023
A look at moves among attorneys, law firms, companies and other players in entertainment law.
A Secondment Can Help Grow Your IP Practice
January 01, 2023
Although your company may have an in-house IP attorney, your company may still need temporary help from an outside law firm to develop your company's patent portfolio and to solve your company's need for temporary help with minimal need for training and financial investment. If you do not have the budget to hire an in-house IP attorney, the solution is to try a secondment — an attorney from an outside law firm temporarily joins your in-house legal team as a "secondee" on a part-time or full-time basis.
Is Asking E-Discovery Vendors for Indemnification for Data Breaches Provide Security of Clients' Data?
January 01, 2023
Threats of cyberattacks have not only made legal professionals more wary — especially as legal teams in firms and in-house are increasingly the target of cyber hackers — but it has also changed their relationship with vendors.
Privilege Logs: Strategy, Best Practices and Practical Advice
January 01, 2023
This article provides an overview of the different types of privilege logs, lays out best practices for negotiating ESI or privilege-log protocols, and discusses other issues that can occur with privilege logs in e-discovery.
Marketing Tech: Avoid Making Hasty Tech Decisions When In Crisis Mode
December 01, 2022
In March 2020 and the months immediately following, many firms found themselves scrambling to implement tools that would meet the needs of new remote work realities. Understandably, many of these decisions were done quickly without the normal level of due diligence. Now, the same firms are realizing that those hasty, though necessary, decisions should be revisited or undone.
Data Minimization Meets Defensible Disposition: Just Say No to ROT and Over-Retention of Personal Information
December 01, 2022
Like a good diet and regular exercise for the body, data minimization and routine, defensible purging of outmoded documents are essential to maintaining healthy organizational information hygiene.
Leaning on Trusted Partners to Drive Legal Tech Adoption and Avoid Failed Implementation
December 01, 2022
Turning to familiar, trusted partners to help navigate the unruly waters of change management, adoption and an ocean of new legal technology options.
FTX Bankruptcy Sends Tremors Through Crypto Regulation
December 01, 2022
The sudden and spectacular crash of crypto-exchange FTX will send long-lasting tremors through both the nation's financial regulatory and bankruptcy landscapes.

MOST POPULAR STORIES

  • Bankruptcy Sales: Finding a Diamond In the Rough
    There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
    Read More ›
  • Restrictive Covenants Meet the Telecommunications Act of 1996
    Congress enacted the Telecommunications Act of 1996 to encourage development of telecommunications technologies, and in particular, to facilitate growth of the wireless telephone industry. The statute's provisions on pre-emption of state and local regulation have been frequently litigated. Last month, however, the Court of Appeals, in <i>Chambers v. Old Stone Hill Road Associates (see infra<i>, p. 7) faced an issue of first impression: Can neighboring landowners invoke private restrictive covenants to prevent construction of a cellular telephone tower? The court upheld the restrictive covenants, recognizing that the federal statute was designed to reduce state and local regulation of cell phone facilities, not to alter rights created by private agreement.
    Read More ›