Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,237 results for "Cybersecurity Law & Strategy"...

Preserving Snaps: Understanding Retention Features of Messaging Apps
August 01, 2021
The recent Doe v. Purdue University case out of the Northern District of Indiana — in which the court sanctioned plaintiff for failing to preserve relevant images and videos from his Snapchat application — teaches that counsel must understand the retention and deletion features of Snapchat and other messaging apps and social media if they are to help their clients preserve relevant ESI.
Call for Nominations: Legalweek Leaders in Tech Law Awards 2022
August 01, 2021
Legalweek and Law.com are seeking nominations from lawyers who have handled cutting edge matters at the intersection of the law and technology.
The Pandemic Job Market: From Drought to Pandemonium
July 01, 2021
This article gives historical context to the events that brought us to the current climate and provides guidance on how employers and employees can successfully navigate the ensuing complexities of job searching and hiring in the post-pandemic pandemonium. Part One of a Two-Part Article
The Future of Litigation Workflow: Reimagining Technology and Process in the Next Decade
July 01, 2021
A cross-section of law firm leaders comment on the current state of litigation, remote training, building cohesive and collaborative multidisciplinary teams, leveraging technology to enhance litigation processes and outcomes, and looking at the practice of law in the next decade.
SCOTUS Narrowly Interprets CFAA to Avoid Criminalizing 'Commonplace Computer Activity'
July 01, 2021
The Court held that only those who obtain information from particular areas of the computer which they are not authorized to access can be said to "exceed authorization," and the statute does not — as the government had argued — cover behavior where a person accesses information which he is authorized to access but does so for improper purposes.
EDRM Asks for Public Comment on New Information Governance Model
July 01, 2021
Adoption of the IGRM model could mean "improving dialogue about information governance, increasing the buy in from stakeholders, and expanding the awareness of the importance of information governance in the modern enterprise."
Upping Your New Business Game with AI
July 01, 2021
With demand for technology innovation and efficiency at an all-time high, we can look to Artificial Intelligence (AI), Machine Learning (ML), and Natural Language Processing (NLP) to help streamline and automate proposal and RFP management, and bridge the gap between increases in RFP requests and lower win rates.
NY Privacy Act Stalls, Would Escalate Protections Above Other State & International Regulations
July 01, 2021
The failure of NYPA to pass is not exceptionally noteworthy. What is noteworthy, however, is that it marks an escalation of data privacy protections and restrictions not seen in other major regulatory regimes, whether in the United States or abroad. And since most believe its failure to pass was due more to the end-of-session rush than its contents, don't be surprised if it pops up again in January 2022.
Managing and Preserving Zoom Data
July 01, 2021
With business conversations extending across video, audio, transcripts and chat, it will not be long before we see Zoom data appearing as evidence in court. Legal teams and CIOs need to think about how to preserve Zoom data proactively for litigation case assessments, discovery, and holds, as well as investigations and regulatory actions.
National Security Implications of the Colonial Pipeline Hack
June 01, 2021
It is difficult to think of a comparable cyber event to the one that effectively shut down the fuel pipeline that feeds over a third of the United States. We are in the midst of a national cyber crisis, and while we may have a blueprint for the resolution of these other crises, things must urgently change on the cybersecurity front.

MOST POPULAR STORIES

  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Technology in Marketing: Where to Invest Your Marketing Technology Dollars
    Law firms have realized that using technology ' particularly the Internet ' is a powerful tool for creating a more level playing field to enhance their images, expand their visibility in targeted markets and drive business to their firms. However, with so many competing interests for limited marketing dollars, where should you invest your firm's resources to get the most bang for the buck?
    Read More ›
  • Coverage Issues Stemming from Dry Cleaner Contamination Suits
    In recent years, there has been a growing number of dry cleaners claiming to be "organic," "green," or "eco-friendly." While that may be true with respect to some, many dry cleaners continue to use a cleaning method involving the use of a solvent called perchloroethylene, commonly known as perc. And, there seems to be an increasing number of lawsuits stemming from environmental problems associated with historic dry cleaning operations utilizing this chemical.
    Read More ›