Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,280 results for "Cybersecurity Law & Strategy"...

2 U.S. Law Firms Among Cybercrime Victims
June 01, 2019
<b><i>Because They Often Possess Valuable Information on a Variety of Companies and Individuals, Law Offices Continue to Be a Favorite Target for Hackers</b></i><p>The DOJ said that two U.S.-based law firms were among the victims of a “complex transnational organized cyber-crime network” that has been taken down.
EU E-Commerce Proposal Aims to Eliminate Barriers; Calls for E-Signatures and Net Neutrality
June 01, 2019
The European Union has put forth an ambitious proposal for how countries can eliminate barriers to e-commerce and protect businesses and consumers engaged in online transactions. But parts of the proposal, published as part of a World Trade Organization initiative that includes the U.S. and China, are likely to face opposition.
Companies Poised To Repeat Data Privacy Compliance Mistakes
June 01, 2019
<b><i>New Study Shows U.S. Companies Are Taking the Same Failed Approach To Complying With California's Privacy Regulation As They Did for GDPR</b></i><p>U.S. companies haven't learned much from the missteps they made while preparing for the European Union's General Data Protection Regulation (GDPR), suggests a new study on data privacy regulation compliance.
State Report: New NJ Data Breach Notification Legislation Signed
June 01, 2019
Legislation expanding the types of personal data that will trigger a required notification to customers in case of a breach, including email addresses and passwords, was signed into law by Gov. Phil Murphy.
State Report: NY Creates Nation's First Regulatory Cybersecurity Division
June 01, 2019
New York's financial regulatory agency has created a first-in-the-nation cybersecurity division to place special focus on protecting the state's consumers and industries from digital threats.
Podcast: Cognitive Security
June 01, 2019
We live in information environment that is unique to this point in time (social media, information overload). How do we know what's true and what's not?
The Nice-to-Haves and Need-to-Haves of Cloud Computing
May 01, 2019
This article discusses what to look for in a cloud service provider and other issues that will help determine if moving to the cloud is the right move for your firm.
IP Theft Goes Far Beyond the Huawei Scandal: How to Stay Safe
May 01, 2019
IP theft is not limited to kingpins of business. Even if your organization has never appeared in the headlines, you cannot rest easy that no one is interested in acquiring your know-how. In fact, analysis the results of our survey for the 2018 Netwrix IT Risks Report reveals that small and medium organizations are actually more vulnerable to IP theft and cyber espionage than enterprises.
Data Security Ethics and Best Practices for Court Reporters
May 01, 2019
The issue of digital security and privacy should be a paramount concern to modern court reporters just as it is to their attorney clients. Yet their biggest risk remains the same as everyone else's: believing it won't happen to them.
The Eyes (and Privacy Laws) of Texas Are Upon You
May 01, 2019
<b><i>Consistent With the Cliché That “Everything's Bigger In Texas,” the Texas Legislature Has Introduced Not One, But Two Separate Bills Relating to the Privacy of Personal Information</b></i><p>The TPPA is arguably the less onerous of the two bills, although you might not necessarily realize it at first blush, given the broad way it defines “personal identifying information” (PII).

MOST POPULAR STORIES