Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,223 results for "Cybersecurity Law & Strategy"...

Protecting Privilege Before and After a Cyber Breach
August 01, 2018
Critical to any counsel working to prevent a cyber attack or respond to a successful cyber intrusion is an understanding of why and how to properly utilize both attorney-client and work-product privilege.
Is Gmail's New Ephemeral Messaging Service a Threat to Data Retention?
August 01, 2018
Despite some potential problems with widespread use of Gmail's 'confidential mode,' the new ephemeral messaging function can be easily managed from an information governance perspective.
Legal Tech: Approaches and Considerations for Discovery Cost Minimization and Recovery
August 01, 2018
The costs of litigation increase with ever more potentially responsive data, litigation technology options, and a truly global reach in the context of much litigation. In response, law firms must continue to consider viable approaches to broaching discussions surrounding the recovery of these costs both within the firm and, more importantly, with law firm clients.
Pitching Your Cybersecurity Case to Law Enforcement Agencies
August 01, 2018
This article focuses on the unique issues that arise in a specific but increasingly common scenario: when your client is the victim of a cybercrime.
Case Study: How Momkus McCluskey Virtualized Its IT for Better Security and Productivity 
August 01, 2018
Whatever direction we went with our IT, we wanted to make sure we would be following the absolute best practices from a security perspective. I needed to know that our data would be safe, secure, as well as fully backed up in case something went wrong.
Issues Between EU Data Protection, Use of Blockchain
August 01, 2018
Emerging technologies and regulations have the power to create, shape or kill businesses. For the entertainment industry, the European Union's (EU) General Data Protection Regulation (GDPR) and blockchain technology each embody forces that have the potential for profound impact. Taken in tandem, the GDPR and blockchain highlight the possibilities and pitfalls of disruption and the importance of cross-organizational collaboration in compliance and innovation initiatives.
Lawyers and Accountants: Collaborators and Competitors
August 01, 2018
Lawyers and accountants are professional allies, but who controls integration and delivery of their services is another story.
Legal Tech: A Deep Dive Into the Tech Upgrades in Thomson Reuters' Westlaw Edge
August 01, 2018
The new technology offering from Thomson Reuters features a retooled warning system for questionable law, an expanded litigation analytics offering, and more.
Book Review: Cybersecurity Program Development for Business: The Essential Planning Guide
August 01, 2018
While many business owners and executives understand that a data security problem/need exists, they do not have a baseline fluency in the concepts and alphabet soup that comprise the language of digital information security. To this extent, Chris Moschovitis' new book is an effective cybersecurity primer for the management community.
Blockchain and GDPR — Frenemies?
July 01, 2018
In a nutshell, GDPR mandates that individuals have access and control over the use and maintenance of their data in certain circumstances, while the foundation of blockchain relies on the immutability of data. On the surface, these concepts seem in direct conflict with each other. This article discusses the points where GDPR and blockchain share common ground, where conflicts may exist and possible approaches for mitigating those conflicts.

MOST POPULAR STORIES

  • Strategic Uses of a Rule 2004 Exam
    While most bankruptcy practitioners are familiar with the basic concepts behind the Rule 2004 exam, some are less familiar with the procedural intricacies of obtaining, conducting, and responding to the exam ' intricacies that often involve practices and procedures adapted from civil discovery that are beyond the scope of pure bankruptcy practice. This article explains.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›