Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,223 results for "Cybersecurity Law & Strategy"...

The Anatomy of a Cyberattack: Step-by-Step
November 01, 2021
This article looks at each stage of a cyberattack, by way of a fictitious attack that took over a real estate agent's email account.
Cybersecurity Awareness Must Extend Beyond the 'Month'
November 01, 2021
For all of that is created and consumed during October's Cybersecurity Month, it is disappointing to see how each year after all the thoughts have been shared, major security incidents continue to emerge. We need to begin to take stock of all the advice given during this month and put it to immediate practice.
The Roadmap of Litigation Analytics
November 01, 2021
Litigation analytics can be considered a roadmap of sorts — an important guide to ensure the legal professional arrives at the correct litigation strategy or business plan. However, like roadmaps, litigation analytics will only be useful if it's based on data that is complete and accurate.
New State Statutes and Federal Guidelines Create Basket Weave of Cybersecurity Compliance
November 01, 2021
The U.S. doesn't have a federal cybersecurity law, but that doesn't mean there is no cybersecurity industry standard. There are regulations, case law, guidelines and state laws that, when combined, create an industry standard applicable to almost all business sectors.
Lessons from 2021 That Will Help Prepare for 2022
November 01, 2021
Many firms are projecting that 2021 will be an improvement over 2020's average revenue growth and PPEP growth, which in January was not the common wisdom. But we have also learned some things in 2021 that should not be forgotten or overlooked in the rush to year-end.
How to Fight Online Defamation
November 01, 2021
Internet tools are becoming more sophisticated in measuring the impact of disparaging and defamatory online statements, paving the way for affected business owners and celebrities to fight back by filing defamation suits seeking to recover damages for the harm to their reputation and brand value.
Ransomware Insurance: Understanding the Developing Legal & Regulatory Landscape
November 01, 2021
In light of the ever-growing ransomware threat, it is important to understand the developing legal and regulatory landscape in order to take the proper steps at the first sign of an attack, including getting the insurance company involved immediately.
21st Century Data Dumps and the 'Brady' Rule
November 01, 2021
What are the document dump rules that apply today? And how does the Brady rule apply to this evolving area of criminal practice? This article will address these issues.
Legal Tech: The Secret Life of E-Discovery Funding
November 01, 2021
The true extent of funding amounts fueling legal tech and e-discovery software companies will likely never be widely shared. The reason is simple: Without regulatory requirements, the competitive risks of disclosing these investments regularly outweighs any potential benefits.
What Makes Forensic Reports Different?
October 01, 2021
Why Are Courts Breaking the Rules and What Are the Unintended Consequences? A lesson learned by young lawyers everywhere is that internal, corporate investigations can be, and frequently are, privileged. However, it is difficult to square that concept with the recent spate of federal court opinions that have concluded that cybersecurity forensic reports generally are not privileged.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Anti-Assignment Override Provisions
    UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›