Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,223 results for "Cybersecurity Law & Strategy"...

In the Know: Top 5 Legal Technology Trends for the 2020s
March 01, 2020
Technology allows attorneys to keep informed so they can help their clients understand the potential impact on their company.
In the Know: Top 5 Legal Technology Trends for the 2020s
March 01, 2020
Technology is changing more rapidly than ever impacting our work, and personal lives. With technology playing such a huge role, it is important for legal marketers to be familiar with technology trends to understand the potential impact on our clients and law firm.
How Law Firms Are Overcoming New Business Development Challenges
March 01, 2020
With the intense competition for new legal work, demands on lawyers' available time and the increasing discounts clients demand, it's getting harder for law firms operating under a billable-hour business model to support the consistent development of new legal work by investing in and maintaining a marketing department alone.
Defining Reasonable Care for the Protection of Personal Data
March 01, 2020
The Pennsylvania Supreme Court enlivened the Thanksgiving holidays of privacy lawyers in 2018 with its decision in Dittman v. UPMC, which held that an employer has a legal duty to exercise reasonable care to safeguard employees' personal information. While the scope of the decision technically was confined to the employer-employee relationship, the court's reasoning implies that such a duty of reasonable care may arise in any scenario where one party engages in the collection of personal information.
Navigating APT Intrusions
March 01, 2020
Advanced Persistent Threat (APT) intrusions are sophisticated cyber-attacks carried out by well-funded and organized cyber-criminals. The attacks are designed to establish persistence using various tactics, techniques and procedures that are intended to avoid detection and mimic authorized activity in the environment, known as "living off the land."
Florida Lawmakers Introduce Online Privacy Legislation
March 01, 2020
Florida lawmakers have introduced companion bills in the Florida House (HB 963) and Senate (SB 1670) that would create limited online privacy rights and obligations in the state. The legislation appears to be very similar to the Nevada Online Privacy Protection Act, which was amended last year to add a right to opt-out of sales of covered information.
Legal Tech: E-Discovery and Seizure Orders Under the Defend Trade Secrets Act
March 01, 2020
Congress passed the Defend Trade Secrets with much fanfare, touting its potential to curtail both domestic and cross-border theft of American ingenuity and technology. The DTSA offers a unique and powerful remedy to aggrieved parties in their efforts to curb trade secret misappropriation: ex parte seizure of property containing trade secrets. This article provides a brief overview of DTSA seizure orders and discusses e-discovery considerations in connection with those orders.
Hybrid Legal Document Review: Where Human and Artificial Intelligence Meet
February 01, 2020
AI is in many ways still in its infancy, and it's important to realize that platforms utilizing this technology are heavily dependent on constant human interaction and training.
A Look Behind, A Look Ahead: Part Two - E-Discovery
February 01, 2020
Part Two of a Two-Part Article Cybersecurity Law & Strategy partnered with our ALM sibling Legaltech News to ask cybersecurity and e-discovery experts what they thought the key trends of 2019 and what they expect to see in 2020. Part Two looks at e-discovery.
The Threat of Ransomware 2.0 for Law Practices
February 01, 2020
During the past few months, there has been a significant paradigm shift in the cybersecurity world. Threat actors from Russia, in particular, have significantly enhanced their capabilities to target individual businesses and Managed Service Providers (MSPs) or IT companies. It is critical that lawyers, their firms and the companies they serve be aware of these threats and take the appropriate measures to proactively secure their own — and their clients' — sensitive and private information.

MOST POPULAR STORIES

  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategic Uses of a Rule 2004 Exam
    While most bankruptcy practitioners are familiar with the basic concepts behind the Rule 2004 exam, some are less familiar with the procedural intricacies of obtaining, conducting, and responding to the exam ' intricacies that often involve practices and procedures adapted from civil discovery that are beyond the scope of pure bankruptcy practice. This article explains.
    Read More ›