Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,258 results for "Cybersecurity Law & Strategy"...

Marriott Moves to Dismiss Data Breach Lawsuit, Says Passport Numbers Useless to Hackers
October 01, 2019
In Its Motion To Dismiss, Marriott Insisted the Breach Caused No Harm to Its Guests and Attached a Declaration By a Former Government Official Who Wrote: "A U.S. Passport Is Virtually Impossible to Forge Successfully." Marriott is insisting that last year's cyberattack did no harm to its hotel guests, not least of which because hackers cannot use stolen passport numbers.
Legal Tech: New Cases Provide Insights on the FRCP 37(e) 'Reasonable Steps to Preserve' Requirement
October 01, 2019
The Franklin and Culhane Cases Demonstrate the Importance of Both Implementing and Then Following Corporate Litigation Readiness Measures for Purposes of FRCP 37(E) An evaluation of FRCP 37(e) necessarily entails examining key motion practice flash points that have arisen since the implementation of the rule. One of the most significant of these flash points is what constitutes "reasonable steps to preserve" relevant ESI.
Legal Tech: Demystifying Social Media Discovery
October 01, 2019
Social Media Escapes an Easy Definition, But You Know It When You See It While it would be helpful to understand the technical details of collecting data from various social media platforms, what's more important is what parts of social media might be relevant to a dispute and what that means for both the requesting and producing parties.
Cybersecurity In the Legal Space: Is Your Organization Prepared?
September 01, 2019
Organizations that continue to be complacent about data security ignore the considerable risks posed by a breach: extended downtime, loss of billable hours, destruction or loss of sensitive data and work product, and the potentially catastrophic costs associated with repairing the damage — both to their technology infrastructure and to their reputation and brand.
GDPR & CCPA Are Just the Beginning
September 01, 2019
How Middle Market Companies Can Shore Up Their Data Privacy The most significant overhaul to the EU's data privacy policies in over 20 years, with extraterritorial reach, forced American businesses to remediate, and in some cases, overhaul their data privacy governance programs. But the GPDR was just the beginning. Organizations seeking compliance with the growing number of data privacy regulations will need to remain vigilant, especially for organizations that rely heavily on personal data.
The State of the U.S. Privacy Job Market, 2019: Part Two
September 01, 2019
A Reflection on the Year Behind, the Years Ahead, and Why Privacy Means So Much to Us Part Two of a Two-Part Article Part two of The State of the U.S. Privacy Job Market, 2019 will outline what is happening within service providers, consultancies, and vendors will touch briefly on government agencies and will predict the near-future state of the U.S. privacy job market.
Legal Tech: Summer 2019 E-Discovery Case Law Review
September 01, 2019
A review of recent cases involving e-discovery.
Legal Tech: Litigation Support, E-discovery and the Recovery of Costs
September 01, 2019
The Data Explosion vs. Recovery Model Stagnation For law firms, the pace of exponential growth of data is a substantial problem — mainly due to the fact that the law firm business model of processing, hosting and storing this avalanche of client data, however, has not evolved as quickly as the data itself.
Legal Tech: What GCs Want from Legal Technology
September 01, 2019
Legal Tech Companies Have to Get Out of Their Own Way In Vying for Law Department Adoption The legal technology industry has some significant hurdles to overcome in its increased push to sell into legal departments, general counsel say, admitting they themselves are part of the problem.
It's Time to Take Third-Party Risk Seriously
September 01, 2019
The use of new technologies such as the Internet of Things (IoT), mobile and cloud by vendors add to the question: Where is my data, and how can I protect it when it is in someone else's hands? In the hustle and bustle of daily business, third parties often become the overlooked or unwitting accomplice in criminal activities.

MOST POPULAR STORIES