Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,223 results for "Cybersecurity Law & Strategy"...

Second Edition ABA Cybersecurity Handbook Reflects the Need for Greater Awareness
February 01, 2018
As 2017 came to a close, the American Bar Association opened the next chapter in cybersecurity awareness with the release of the second edition of its…
Password-Sharing May Be a Federal Crime under the Muddied Waters of the CFAA
February 01, 2018
The Computer Fraud and Abuse Act (CFAA) is a federal statute that provides for not only criminal liability, but also civil liability, when a person accesses…
Some Law Firm Leaders See Rosy 2018 Ahead
February 01, 2018
When it comes to law firm business, not everyone is depressed about the slow growth that plagued many firms in 2017, and that's predicted to persist into the new year. Or at least they won't admit it.
Cybersecurity Spending at Law Firms, Legal Departments Is Predicted to Increase in 2018
February 01, 2018
As law firms and legal departments finalize their 2018 budgets, many lawyers in both the United States and Canada plan to increase cybersecurity spending.
<i>Legal Tech:</i> Peril in Paper: <i>EEOC v. GMRI</i> and the Digital Divide in e-Discovery Sanctions
February 01, 2018
There was a time not so long ago when the term “e-discovery” didn't exist. It was known simply by its legal name, discovery. We're now entering an era where some observers feel the term will fade into history, returning us back to simply calling it discovery.
Preparing for Proxy Season 2018: A Primer for General Counsel
January 03, 2018
As we enter 2018, public companies across the United States will begin, in earnest, their preparations for this year's proxy season and annual shareholder meetings. It is not an understatement to say that 2017 was a tumultuous year on many fronts — economically, politically and globally. As a result, general counsel should have several issues on their radar that could play a role in 2018's proxy season.
The Uber Breach and the Need for an Independent Privacy Function
January 01, 2018
Uber has incurred significant legal and reputational exposure as a result of the way that the company handled the breach. In the coming months, there will be a great deal of information and regulatory and judicial action that will act as guidance, or more precisely, a checklist of what-not-to-do, for companies that suffer a data breach.
How Blockchain Technology Can Drive the Legal Industry Forward
January 01, 2018
A new legal structure that bestows and monitors trust must be employed. Is decentralization of traditional, gigantic central bank repositories of data the answer? Is blockchain technology the new path that the legal industry should take to sustain in the digital age? Let us consider the most significant implications of decentralized technologies to the legal industry.
Regulators are Catching Up to Cryptocurrency and Blockchain Technology within the Financial Services Industry
January 01, 2018
<b><i>Part Two of a Two-Part Article</b></i><p>The proliferation of cryptocurrency and blockchain is being driven by the efficiencies and protections afforded to early adopters. The operational efficiencies and resulting cost savings are readily apparent in the financial services industry and are equally coveted by the entities trying to implement them and by the customers who will benefit from the implementation. However, neither party can fully enjoy these benefits without first understanding and overcoming the various regulatory hurdles.
Top Cybersecurity Takeaways from Relativity Fest 2017
January 01, 2018
Cybersecurity is a hydra of complexity. Keeping a grasp on it requires constant re-education. What no one tells you: managing your company's cyber vulnerability demands a willingness for personal vulnerability. Being honest about our cyber risks is painful. And scary.

MOST POPULAR STORIES

  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategic Uses of a Rule 2004 Exam
    While most bankruptcy practitioners are familiar with the basic concepts behind the Rule 2004 exam, some are less familiar with the procedural intricacies of obtaining, conducting, and responding to the exam ' intricacies that often involve practices and procedures adapted from civil discovery that are beyond the scope of pure bankruptcy practice. This article explains.
    Read More ›