Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,237 results for "Cybersecurity Law & Strategy"...

Third Circuit Weighs Novel Cybersecurity Case
Five years ago, Russian hackers broke into the Wyndham Hotels computer network and stole the credit card information for thousands of customers, a security breach that has now put the novel question of whether the FTC can sue a company for failing to properly secure its data in front of the Third Circuit.
You First: Manufacturing, IP, and the Coming 3D Printing Disruption
Like it or not, the manufacturing industry looks like it will be first in line to feel the potential transformative impact of 3D printing or additive manufacturing. At the same time, changes in intellectual property (IP) law unrelated to 3D printing will impact the disruption in manufacturing.
The Internet User's Duty of Care
The duty one Internet user has to another has changed, particularly with respect to cybersecurity and privacy. Negligence by Internet users has enabled hackers and creators of viruses to exploit computer systems and engage in crime and unwanted computer intrusions.
Best Practices for Law Firms to Meet Cybersecurity Requirements of Inside Counsel
Whether or not your clients have suffered a data breach, cybersecurity is undoubtedly a critical concern. Many of your clients are actively searching for and plugging any gaps in their security. And if your clients haven't done so already, they're also going to focus their attention on what could potentially be an Achilles Heel for them ' their law firms.
The Case for the GC
In a time of increasing regulatory risk, global complexity and shareholder activism, the role of the corporate general counsel in the boardroom has never been more important. Yet, companies have been slow to recruit general counsels or seasoned attorneys to serve as independent directors.
Movers & Shakers
A Collection of Moves in the Cybersecurity and Privacy Practice Areas
<b><i>Online Extra:</b></i> Premera Data Breach Compromises Up to 11 Million Users' Records
Over the last year, cyberbreaches targeting health care and insurance companies have made headlines almost as frequently as those of large well-established business. Due to the sensitive material collected by companies in the health care space, companies in this industry are a particularly attractive target to cybercriminals and painful for organizations and their customers.
<b><i>Online Extra:</b></i> Law Firms to Form Cybersecurity Alliance
As pressure to strengthen defenses against security breaches increases, at least five Am Law 100 and Magic Circle firms are working to form an alliance that would allow them to ultimately share information with each other about cyber threats and vulnerability.
Cybersecurity Practices Booming In Era of the Breach
The cybersecurity woes of companies like Target and Sony in 2014 and Anthem last month have meant a busy start to 2015 for law firm data-privacy and security practices.
Law Firms Aren't Immune to Cybersecurity Risks
Although law firms have managed to remain off the list of the year's biggest data breach victims, firms watching cybersecurity trends most closely are feeling increasingly uneasy about their own security posture.

MOST POPULAR STORIES

  • The 'Sophisticated Insured' Defense
    A majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.
    Read More ›
  • Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric Code
    In an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.
    Read More ›