We found 1,223 results for "Cybersecurity Law & Strategy"...
Influencing the Influencers
January 01, 2018
The importance of promoting brands and products on digital platforms has continued to grow as advertisers are learning how to use social media to reach out to specific populations by harnessing the power and goodwill of the people on these platforms that are popular with and influence particular niche groups of interest. These so-called “influencers” can have thousands, or even millions and tens of millions of followers. But when is the influencer an objective critic, and when is she a paid spokesperson?
Artificially Intelligent Blockchain of Things: Examining Legal Tech's Biggest Buzzwords
January 01, 2018
<b><i>Panelists at ALM Cybersecure 2017 Delved Into the Year's Biggest Legal Technology Buzzwords and the Hype Fueling Their Popularity</i></b><p>Legal technology has no shortage of buzzwords. The latest slew to take the industry by storm were the topic conversation in a Dec. 5 panel at ALM's CyberSecure event in New York.
The Impact of the Surge of Biometric Data Privacy Lawsuits Against Employers
January 01, 2018
The growing acceptance of biometric data as a form of identification for employees means that many employers will likely have to face issues covered in state legislation in the immediate future.
<i>Legal Tech:</i>Looking Ahead: 2018 Legal Technology Predictions
January 01, 2018
At law firms and legal departments, preparing for the new year should mean looking back at the last year and prioritizing revenue-driving activities, identifying strategies to grow your firm or company while mitigating risk and budgeting for new projects to meet client demands.
Ransomware: What to Do When It Happens to You
January 01, 2018
In the event that your company is the victim of a ransomware attack, this article provides steps to be taken as part of its response to such an incident. It is meant to be a helpful guide, but the best response generally will depend on different factors, including the scope and severity of the attack, availability of remediation measures, and business sensitivities.
<i>Legal Tech:</i>What an Attorney Can Learn from Legal Tech Marketing Professionals
January 01, 2018
Some key takeaways and hot topics that should be on the radar of lawyers from the Legal Marketing Association's Legal Marketing Technology Conference in Chicago.
2018: What Last Year's Trends Can Mean for Big Law
January 01, 2018
With the new year upon us, law firms have just been through the typical year-end crush of collections, budgeting, compensation decisions and more. The authors recently took a look at 2017's hottest trends, and explored what we could expect from them in 2018.
SEC's New Cyber Unit Moves to Tackle 'Scam' Coin Offering
January 01, 2018
<b><i>In the First Enforcement Action Initiated By Its New “Cyber Unit,” the SEC Announced It Has Secured a Court Order to Freeze the Assets of Individuals Behind a “Scam” Initial Coin Offering</b></i><p>In the first enforcement action initiated by its new “Cyber Unit,” the Securities and Exchange Commission (SEC) recently announced it has secured a court order to freeze the assets of individuals behind a “scam” initial coin offering, or ICO.
<i>Online Extra:</i><br>Social Media: Questions of Admissibility And Ethics
January 01, 2018
Social media evidence can be acquired both informally — through an attorney's own investigation or from the client — or more formally through the use of discovery and the rules of discovery. While each gives rise to practical and ethical issues, this section will focus on informal methods of acquisition.
In an Era of Crises and Controversies, How Ready Is Your Law Firm?
January 01, 2018
Although the current news cycle is a barrage of negative situations, the silver lining is that they offer law firms a wealth of teachable moments about the importance of preparing for and responding to a crisis situation.
MOST POPULAR STORIES
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- The Anti-Assignment Override ProvisionsUCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?Read More ›