Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,237 results for "Cybersecurity Law & Strategy"...

The Unheralded Value of a Contract
May 01, 2021
The most important part of a contract is the data that it generates. If you take all that data from each contract, then aggregate, organize and analyze it, you will have critical insights into the overall effectiveness of your contracting process and the way you transact business.
Should Your Clients' Involvement With Cryptocurrency Scare You?
May 01, 2021
It's not a matter of whether you have an interest in crypto, think it's all a bizarre techno-bubble, the eventual replacement for fiat currency, or somewhere in between. The fact of the matter is your clients, and future clients, are more likely than ever to have a connection to this market, and a brief review of the headlines can make this prospect seem terrifying.
The World of NFTs
May 01, 2021
NFTs have been all the rage lately. So what exactly are they?
Can You Hear Me Now? — Privacy of Discussions
May 01, 2021
This article looks at privacy discussions, focusing on what in the circumstances discussed renders the IT data private and whether the criteria relied upon when courts and others in the discussion determine that the data is or is not private is truly determinative, as well as properly understood.
How to Avoid 'Privacy Debt'
May 01, 2021
For many tech companies today, their products and business model require the collection and storage of data. At the same time, a failure to build adequate data protection technology, processes, and operations will continuously generate "privacy debt" for the business. The accumulation of this "privacy debt" can eventually turn away customers, attract regulatory penalties, and create an existential risk for the company.
Gender Equity Is Part of DRI's DNA
May 01, 2021
DRI is leading the way for women to take hold of leadership positions, setting the standard for other industry organizations to follow suit.
Legal Tech: Time to Move from Email to Centralized Platform for E-Discovery
May 01, 2021
Lawyers need to move away from email as a project management tool to a centralized project management platform — akin to a huge, shared, digital whiteboard — where all production requests are entered on a form that meets litigation support needs.
The Adoption of Legal Analytics
April 01, 2021
The legal profession continues to embrace legal analytics and its advantages in increasing numbers every year. Now, the more interesting questions pertain to how legal professionals use legal analytics and what the likely path is for legal analytics in the future.
Maintaining Attorney-Client Privilege and Work Product Protections over Forensic Reports in Light of 'Wengui v. Clark Hill'
April 01, 2021
The Clark Hill opinion is notable because not only does it follow a string of recent opinions that have found data breach forensic reports not to be entitled to work product protection, it also goes one step further to find that a data breach forensic report is not protected by attorney-client privilege.
Why Untangling the CISO from IT Can Improve Governance and Security Outcomes
April 01, 2021
Despite the fact that the CISO's duties are growing in scope and importance, and data protection has become a board-level concern, many security leaders still do not have a direct line to the CEO.

MOST POPULAR STORIES

  • Coverage Issues Stemming from Dry Cleaner Contamination Suits
    In recent years, there has been a growing number of dry cleaners claiming to be "organic," "green," or "eco-friendly." While that may be true with respect to some, many dry cleaners continue to use a cleaning method involving the use of a solvent called perchloroethylene, commonly known as perc. And, there seems to be an increasing number of lawsuits stemming from environmental problems associated with historic dry cleaning operations utilizing this chemical.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Technology in Marketing: Where to Invest Your Marketing Technology Dollars
    Law firms have realized that using technology ' particularly the Internet ' is a powerful tool for creating a more level playing field to enhance their images, expand their visibility in targeted markets and drive business to their firms. However, with so many competing interests for limited marketing dollars, where should you invest your firm's resources to get the most bang for the buck?
    Read More ›