Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,223 results for "Cybersecurity Law & Strategy"...

Just Say No to Hackers
August 01, 2019
<b><i>Conference of Mayors Resolution Calls for Cities Not to Pay Ransomware</b></i><p>The underlying logic is pretty straightforward: if bad actors realize that there's no longer any cash waiting for them at the end of the rainbow, they'll eventually pack up their ball and go home.
EU Court Rules Adding Facebook 'Like' Button Triggers GDPR Data Collection Obligation
August 01, 2019
Websites with embedded Facebook “like” buttons must inform users their data will be collected and processed by the social media giant, the Court of Justice of the European Union has ruled.
Legal Tech: Smart Speakers and E-Discovery
August 01, 2019
For businesses that own such a device, or for individual employees who might have a personally owned one on their office desk, the question of who owns any recorded data remains murky.
5 Quick and Easy Ways to Hack Your Business Development
July 01, 2019
The most popular justification for avoiding business-development activities is a lack of time. There are, however, a number of strategies that will allow you to execute and produce results in minutes — or even seconds.
Legal Tech: How E-Discovery Trends Are Reshaping E-Discovery Teams
July 01, 2019
E-discovery, as an industry, is once again at an inflection point. What are the big trends that are exerting pressure on e-discovery teams today — and more importantly, what will an effective e-discovery team look like in the coming years?
Fourth Quarter Educational Events to Stay on Track
July 01, 2019
A review of upcoming programs and events that bring together many of the most active professionals in the field and its various branches.
When Key Employees Quit: 5 Things You Must Do to Keep Control of Critical Data
July 01, 2019
Losing a key employee is never easy — they often take with them institutional knowledge, great internal and external relationships, and critical skill sets. There is also a risk that they'll take some information or data with them when they go, either inadvertently or on purpose.
Training Machines to Speak Legalese: The Perils and Promise of AI in Law
July 01, 2019
When AI is deployed appropriately with proper oversight, it helps us make connections we couldn't see before, leading us to new legal and business insights. But teaching machines how to interpret “legalese” is nearly as challenging as the task it is trying to solve.
Are Companies Playing It Too Safe With GDPR Breach Reporting?
July 01, 2019
A new report from the law firm of Pinsent Masons shows that there has been a high level of GDPR "over-reporting" at the U.K.'s Information Commissioner's Office, but organizations who may think they are playing it safe may actually be opening themselves up to further regulatory scrutiny.
Electronic Signatures: Legal and Practical Considerations for E-Signing on the Virtual Dotted Line
July 01, 2019
In assessing whether or how to employ e-signatures, particularly in higher risk transactions, organizations should be careful to manage the practical issues and potential legal complexities associated with e-signatures through careful assessment and a robust governance program.

MOST POPULAR STORIES

  • Strategic Uses of a Rule 2004 Exam
    While most bankruptcy practitioners are familiar with the basic concepts behind the Rule 2004 exam, some are less familiar with the procedural intricacies of obtaining, conducting, and responding to the exam ' intricacies that often involve practices and procedures adapted from civil discovery that are beyond the scope of pure bankruptcy practice. This article explains.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›