Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,223 results for "Cybersecurity Law & Strategy"...

Electronic Discovery Document Review: The Power of Feedback
October 01, 2021
Human review of documents will continue to play a huge part in the ediscovery process. Managing reviewer training and accuracy can make or break the budget for your matter.
Competing by Connecting: In an Increasingly Crowded Market, Litigation Teams Must Leverage Centralized Technologies to Rise Above Their Rivals
October 01, 2021
Regardless of where each law firm currently stands in its innovation journey, it is crystal clear that the need to speed up the modernization of their technology solutions that facilitate connectivity, automation and workflow between their staff is real and immediate.
Mobile Devices Can Provide Lucrative Back Door Into Businesses for Cyber Thieves
October 01, 2021
We live with the reality that the once ordinary communication tool is now a potent device that needs to be used responsibly on the basis that there is a cybercriminal fraternity hell-bent on accessing said devices for ill-gotten gain.
Hybrid Work Environments Add to Internal Cybersecurity Risk
October 01, 2021
Are law firms truly prepared for evolving threats on the horizon, especially with hybrid work arrangements gaining momentum?
Why Are Courts Making Cybersecurity Forensics Reports Not Privileged?
October 01, 2021
Internal corporate investigations can be, and frequently are, privileged. However, it is difficult to square that concept with the recent spate of federal court opinions that have concluded that cybersecurity forensic reports generally are not privileged.
9th Circuit: Police Violated Google Users' Privacy Rights After Automated Email Scan Detected Child Pornography
October 01, 2021
A federal appeals court found that law enforcement violated a Google user's constitutional rights when it opened email attachments the platform flagged as child pornography through an automated system.
Flat Fee or Consumption-Based E-Discovery Pricing? Depends on Who You Ask
October 01, 2021
Being charged per gigabyte by an e-discovery software platform isn't new, but it can still be a budgetary drain for law firms that handle many large e-discovery matters.
Slut-Shamed In the Workplace? Avoiding Exposure for Your Employees' Exposure
September 01, 2021
Situations involving an employee's voluntary online exposure rarely end well and can bring legal exposure for the employer.
How to Address Evolving Privacy Regulations During Discovery
September 01, 2021
One Recipe for Success: Treat Private Data With the Same Priority Given to Privilege But for all the coverage that privacy regulations are meant to provide, there is precious little guidance about how to protect private information, and there is very little legal precedent to guide our practices.
Artificial Intelligence and Subject Matter Eligibility In U.S. Patent Office Appeals
September 01, 2021
For the foreseeable future, patent applications involving artificial intelligence technologies, including machine learning, will increase with the continued proliferation of such technologies. However, subject matter eligibility can be a significant challenge in securing patents on artificial intelligence and machine learning.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Anti-Assignment Override Provisions
    UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›