Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,258 results for "Cybersecurity Law & Strategy"...

Companies Poised To Repeat Data Privacy Compliance Mistakes
June 01, 2019
<b><i>New Study Shows U.S. Companies Are Taking the Same Failed Approach To Complying With California's Privacy Regulation As They Did for GDPR</b></i><p>U.S. companies haven't learned much from the missteps they made while preparing for the European Union's General Data Protection Regulation (GDPR), suggests a new study on data privacy regulation compliance.
State Report: New NJ Data Breach Notification Legislation Signed
June 01, 2019
Legislation expanding the types of personal data that will trigger a required notification to customers in case of a breach, including email addresses and passwords, was signed into law by Gov. Phil Murphy.
State Report: NY Creates Nation's First Regulatory Cybersecurity Division
June 01, 2019
New York's financial regulatory agency has created a first-in-the-nation cybersecurity division to place special focus on protecting the state's consumers and industries from digital threats.
Podcast: Cognitive Security
June 01, 2019
We live in information environment that is unique to this point in time (social media, information overload). How do we know what's true and what's not?
The Nice-to-Haves and Need-to-Haves of Cloud Computing
May 01, 2019
This article discusses what to look for in a cloud service provider and other issues that will help determine if moving to the cloud is the right move for your firm.
IP Theft Goes Far Beyond the Huawei Scandal: How to Stay Safe
May 01, 2019
IP theft is not limited to kingpins of business. Even if your organization has never appeared in the headlines, you cannot rest easy that no one is interested in acquiring your know-how. In fact, analysis the results of our survey for the 2018 Netwrix IT Risks Report reveals that small and medium organizations are actually more vulnerable to IP theft and cyber espionage than enterprises.
Data Security Ethics and Best Practices for Court Reporters
May 01, 2019
The issue of digital security and privacy should be a paramount concern to modern court reporters just as it is to their attorney clients. Yet their biggest risk remains the same as everyone else's: believing it won't happen to them.
The Eyes (and Privacy Laws) of Texas Are Upon You
May 01, 2019
<b><i>Consistent With the Cliché That “Everything's Bigger In Texas,” the Texas Legislature Has Introduced Not One, But Two Separate Bills Relating to the Privacy of Personal Information</b></i><p>The TPPA is arguably the less onerous of the two bills, although you might not necessarily realize it at first blush, given the broad way it defines “personal identifying information” (PII).
Safeguarding Client Data: An Attorney's Duty to Provide 'Reasonable' Security
May 01, 2019
Effective cybersecurity requires an ongoing, risk-based, comprehensive process that addresses people, policies and procedures, and technology, including training. Effective security also requires an understanding that security is everyone's responsibility and constant security awareness by all users of technology.
New York's Cyber Regulation Two Years Later: We've Only Just Begun
May 01, 2019
<b><i>The Conclusion of the “Transitional Period” for New York's Cybersecurity Regulation Marks the Beginning, Rather Than the End, of an Organization's Compliance Efforts</b></i><p> Financial institutions will have to certify annually that their internal controls and cybersecurity practices remain up to snuff. And now that the transitional periods for implementing the cyber regulation have passed, covered institutions will need to certify that they have complied with each provision.

MOST POPULAR STORIES