Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,223 results for "Cybersecurity Law & Strategy"...

How to Cut IT Costs with Leasing
September 01, 2021
While analysts predict firms will still see savings from expense cuts in 2021, these savings won't be as dramatic as in 2020 and, moreover, recommend that firms should use profit gains in 2020 and 2021 to invest in long-term strategies for growth — like technology.
Strategy vs. Tactics: Two Sides of a Difficult Coin
September 01, 2021
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks now target the critical infrastructure of the most powerful country on the planet.
Biometric Law Litigation Expands Beyond Social Media
September 01, 2021
Social media has played an oversized role in lawsuits under state and local biometric privacy laws. Now, a New York City law that took effect in July is likely to significantly expand the range of biometric-related litigation beyond social media companies to a new group of defendants: retail stores, places of entertainment, and food and drink establishments.
Emojis and E-Discovery
September 01, 2021
Emojis are an important aspect of everyday communication in 2021. Given their ubiquity, there should be little surprise that emojis have become a key source of evidence in civil and criminal cases.
Applying Scientific Method to E-Discovery Growth
September 01, 2021
This article discusses scientific method as it applies to the growth of e-discovery and its protocols.
Tightening Antitrust Enforcement Could Be Boon for E-Discovery
September 01, 2021
U.S. antitrust enforcement is tightening, and e-discovery practitioners and vendors in the M&A market are expecting an uptick in work. But the influx of complex discovery may drain resources for other corporate e-discovery matters.
The Queen's Gambit: Vetting Costs and Other Factors In Hiring a Tech Vendor
September 01, 2021
There are numerous "gameplays" to reduce risks when selecting and hiring a technology vendor. With each mitigating factor you incorporate into your contracting playbook, prepare to incur additional costs.
Virtual Reality or the New Reality of Virtual Practice?
August 01, 2021
In response to the worst period on record for cyber attacks, the ABA published Formal Opinion 498 to address practicing law outside of the traditional brick-and-mortar office environment. It reminds lawyers that while the ABA Model Rules permit virtual practice, they provide minimum requirements and recommendations for virtual practice, particularly in the areas of competence, confidentiality and supervision.
Strategy vs. Tactics: Two Sides of a Difficult Coin
August 01, 2021
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
The Queen's Gambit: A Proactive Approach to Reducing Technology Vendors' Contracting Risk
August 01, 2021
There are numerous "gameplays" to reduce risks when selecting and hiring a technology vendor. Whether you are able to accept a risk and to what extent are not always clear. Just know that, like in chess, your opening move to an IT deal can be your most powerful.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Anti-Assignment Override Provisions
    UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›