Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,223 results for "Cybersecurity Law & Strategy"...

The Rise of False Claims Act Cybersecurity Litigation
March 01, 2022
While the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.
Diversity & Technology: Training Your AI to Be More Inclusive
March 01, 2022
AI is maturing and creating countless new opportunities to help people live better lives at home and work. As the technology evolves, it is essential that it does so inclusively, equally recognizing and serving all individuals who make up the world's population.
Legal Tech: The Risks and Rewards of Interweaving Legal Technologies
March 01, 2022
The trend of legal technology companies working in concert to either overcome a mutual competitor, offer a stronger solution to existing clients, or a combination of the two is a strategic approach that is beginning to become a signature of the space.
The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity Litigation
March 01, 2022
While the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.
Innovation In a Hyper-Competitive Market
February 01, 2022
The results of interviewing 30 chief talent officers along with directors and managers of recruiting reveal the impact of the pandemic on entry-level and lateral hiring, the appetite for leveraging technology to address the rapid acceleration in on-campus interviewing and lateral recruitment, and the increased focus on innovation to fuel law firm success.
Building AI and Machine Learning Technologies: Data Licensing Tips and Traps
February 01, 2022
Data is the fuel for software development, and developers use historical data from existing products to train algorithms and build AI and machine learning models. Companies are well aware of privacy and regulatory restrictions on data use, but often do not consider the potential impact of data use restrictions on intellectual property ownership and use rights.
Cybersecurity and Legal Tech In 2022: Predictions from the Field: Part Two
February 01, 2022
Predictions from experts continue, with a look at what 2022 might hold in next generation technology, legal operations and contract review.
The Top 10 2022 Job Market Predictions in Legal Technology
February 01, 2022
In 2022 hiring will remain the top obstacle to business fulfillment across the e-discovery, data privacy, and cybersecurity landscapes. Here's how to stay a cut above the competition — whether you are an employer or a job seeker.
Landscape of Standalone Cybersecurity Policies Has Changed Due to Increased Risk and Scrutiny
February 01, 2022
Because the market is rapidly changing, policyholders should not expect that they'll be offered the same coverage at renewal. Policyholders should start their renewal process earlier going into this year's renewal so they have time to analyze new pricing, as well as new endorsements that may limit coverage and consider alternative forms, insurers, and policies to maximize coverage.
Inside Cryptocurrency Pump-and-Dump Schemes
February 01, 2022
Since the inception of cryptocurrency as a widely traded asset, there has been increasing opportunity to make money through market manipulation, specifically through classic pump-and-dump and related fraudulent schemes, and more specifically CPDs.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • "Holy Fair Use, Batman": Copyright, Fair Use and the Dark Knight
    The copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›