Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,237 results for "Cybersecurity Law & Strategy"...

Planning a Merger? Avoid Pitfalls through Proper Due Diligence
After reaching an all-time high in 2013, the pace of U.S. law firm mergers and acquisitions is showing no signs of slowing down. With all of these deals in the news of late, you may be considering whether a merger or acquisition might be an appropriate growth strategy for your firm.
The State of U.S. Cybersecurity: Not So Good
Every day brings new national headlines about a cyberattack, an alarming trend. The latest iteration of an annual report shows that these growing concerns have not necessarily translated into developing and deploying the proper defensive capabilities.
Paper's Hidden Security Risk
It is almost impossible to open a newspaper today without reading about cybersecurity breaches. Target Corp., Neimann Marcus and many other companies have been targeted, and many experts think it is only a matter of time until law firms are targeted (if it's not too late already). All this "cyber risk" may have you pining for the days before computers, when almost all information was stored on paper.
Coping with Evolving Cybersecurity Rules
Cybersecurity and data protection, more than ever, are priority items for the government and private sector. The government has reacted by proposing legislative "fixes" that would require organizations to satisfy basic levels of cybersecurity protection and disclose breaches or face fines. Whether a mandatory compliance model will be effective given the rapid pace by which technology advances is unclear. It may be unrealistic to expect the government's legislative pace to keep up with hackers.
Fed. Judge Says FTC Can Sue over Poor Data Security
In a case being closely watched by general counsel, a federal judge ruled last month that the FTC has the authority to take legal action against companies that have faulty security practices for consumer data.
The Human Factor in Data Security
While high-profile targeted cyberattacks received great attention in 2013, data breaches due to human error continue to be a regular occurrence. The good news, such as it is, is that today, more attention is focused on combatting cyber threats than ever before.
Law Firms' Prime Data Security Threat Is Their Own Employees
From kill commands and encryption codes to government espionage and foreign hackers, law firm life is beginning to resemble the plot line of a spy thriller.
White House Uploads U.S. Cybersecurity Framework
President Barack Obama's administration on Feb. 12 released its much-anticipated voluntary cybersecurity framework, giving U.S. companies a common handbook on how they can try to fend off hackers.
Forced Decryption in Government Investigations
In the wake of the Snowden leaks, makers of encryption products can expect a strong uptick in demand, as encryption will likely become even more widely used.
U.S. Releases Draft Cybersecurity Framework
The U.S. Department of Commerce's National Institute of Standards and Technology (NIST) released its draft of a voluntary cybersecurity framework on Oct. 22 that will allow both private and public companies that work with critical infrastructure to better evaluate cyber risk, and prepare better defenses against ever-increasing online attacks.

MOST POPULAR STORIES

  • The 'Sophisticated Insured' Defense
    A majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.
    Read More ›
  • Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric Code
    In an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.
    Read More ›