Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,237 results for "Cybersecurity Law & Strategy"...

Online Extra: Just How Far Will the Supreme Court's 'Carpenter' Opinion Reverberate?
The ruling restricting the collection of historical cell site location information (CSLI) without a warrant aims to be narrow in scope, but legal experts argue it may have repercussions for years to come.
Legal Tech: Warning Signs of Subpar Tech Support
Your firm has identified an exciting new technology and done its due diligence. And then, you find yourself in the worst possible scenario: It turns out that the provider's technical support stinks. Here are some potential red flags that will help you evaluate a provider's technical support before you sign on the dotted line.
General Data Protection Regulation: Defense or Offense?
Ostensibly, GDPR's mission is to strengthen and unify the EU's protection of online privacy rights and promote data protection for citizens of the 28 countries currently in the EU. In the global economy, however, GDPR serves as an alarm to all countries with business flowing across Europe and well beyond. Where business flows, data follow.
Security Breach Responses — As Important and Difficult As Ever
The confusing and conflicting world of contractual requirements and personal data security breach notification laws can add insult and expense to injury, and sometimes adds injury itself. Tough -- and sometimes expensive -- choices need to be made quickly.
Protecting Privilege Before and After a Cyber Breach
Critical to any counsel working to prevent a cyber-attack or respond to a successful cyber intrusion is an understanding why and how to properly utilize both attorney-client and work-product privilege. The overriding principle of using privilege is straightforward: to protect your organization's investigation and breach response efforts from usage by third parties or regulatory agencies in litigation arising from a breach.
This is Not Your Father's Cloud
<b><i>Part One of a Two-Part Article</b></i><p>Part One of this two-part article is aimed at demystifying the hesitations behind cloud security and analyzing the fast-growing transformation to a range of newer technical approaches with important consequences for legal practice.
How Cyber Threats Affect Law Firm Marketers
Even though law firms don't generally manage retail-type websites, they are far from immune to cyber threats. In fact, firms are prime targets for cyber criminals.
The Power of Certifications in Legal
<b><i>Part Two of a Two-Part Article</b></i><p>Professionals in e-discovery and privacy, including lawyers, are hungry for growth opportunities and may be ripe to transition into certain security-centric positions; however, the security job landscape is far more expansive and far less commoditized than ESI or privacy — for now. Part Two provides a road map for how certifications can assist an individual or an organization in reinventing, repurposing, creating or maintaining cybersecurity talents.
Navigating the Fear and Promise of Artificial Intelligence
With the corpus of law data becoming ever-more complex and nuanced, the use of machine-assisted research and analysis is becoming more of a requirement, rather than an option, in the legal profession. Because of this, some have expressed fear that robot-lawyers will replace legal professionals.
Online Extra: The Evolving Nature of Cyber Law
<b><i>A Q&A with Penn Law Prof. Anne Toomey McKenna</b></i><p>The newly appointed Penn State professor sees a lot of room for questions in the evolving cyber law landscape, but so far there are few answers.

MOST POPULAR STORIES

  • Artist Challenges Copyright Office Refusal to Register Award-Winning AI-Assisted Work
    Copyright law has long struggled to keep pace with advances in technology, and the debate around the copyrightability of AI-assisted works is no exception. At issue is the human authorship requirement: the principle that a work must have a human author to be eligible for copyright protection. While the Copyright Office has previously cited this "bedrock requirement of copyright" to reject registrations, recent decisions have focused on the role of human authorship in the context of AI.
    Read More ›
  • Recently Introduced Bill Would Limit ITC 'Domestic Industry by Subpoena'
    Patent infringement disputes in the United States are not only heard in district courts. The U.S. International Trade Commission (ITC) also decides high-stakes intellectual property disputes — with the remedy for the IP rights holder not being damages, but rather an exclusion order that can block a competitor's importation of infringing articles into the U.S. That remedy can be incredibly powerful for companies engaged in stiff competition in the U.S. market.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›