Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,237 results for "Cybersecurity Law & Strategy"...

Digital Copiers Don't Forget
The measures discussed in this article can help organizations to manage the risks associated with operating in the digital environment. This is important because, in 2012, ignorance of what your copier remembers is no longer a defense.
SOPA Update
On Dec. 15 and 16, just as Congress was preparing to go dark until after the New Year, The U.S. House of Representatives Committee on the Judiciary held hearings on SOPA. And what seemed destined to be a long drawn-out fight by a few in attendance who were in opposition of passing the Bill against Committee Chairman and sponsor Lamar Smith (R-TX) and its many supporters, took a bizarre and sudden turn as Day 2 restarted after lunch ' and maybe more importantly, as Representatives' flights home for recess were in danger of being missed.
Computer Fraud and Abuse Act: Finding the Line in the Sand
The scope of the CFAA is the subject of an emerging split among federal courts of appeals as highlighted by a recent opinion by the U.S. Court of Appeals for the Ninth Circuit, which rejected the claim that its decision would make criminals out of millions of employees who might utilize their work computers for personal use.
<b><i>Commentary:</b></i> Cybersecurity Needs Public Notice
There is an important debate unfolding across government and the private sector over a critical national security issue: how to secure America's information networks from cybersabotage, espionage and attacks. Congress, the executive branch and the private sector must all do a better job of engaging the public on decisions that are so important.
Law Firms Slow To Awaken to Cybersecurity Threats
Law firms have been targeted by a sophisticated network of overseas hackers looking to infiltrate computer systems in order to gather data or monitor attorney activity, according to attorneys and technology experts. Law firms have dealt quietly with cyberattacks for years, but lately those strikes appear to be on the rise.
Are Web Applications a Security Concern?
Private companies with external Web sites can be susceptible to attackers looking to commit defacement or infiltrate computer networks to steal sensitive information. Here's what you need to know.
Are Web Applications a Security Concern?
Over the Fourth of July holiday weekend, a wave of cyber-assaults, or "denial of service" attacks, believed to have originated in North Korea, targeted a number of U.S. and South Korean government agencies and commercial Web sites, causing some to suffer temporary outages. While there were no reported leaks of classified information or serious damage to networks, the organized assault underscored the conclusions of a recent White House cybersecurity review; namely, that the country's digital infrastructure and domestic networks are not secure.
e-Commerce Companies v. Hackers
The 21st century is clearly the age of cybercrime, and e-commerce companies of all stripes should be especially concerned because there are only two types of computer systems: those that have been hacked, and those that will be hacked.
Franchise Companies vs. Hackers: Twenty Questions on Cybercrime
The 21st century is clearly the age of cybercrime, and franchise companies should be especially concerned because, simplistically, there are only two types of computer systems: those that have been hacked, and those that will be hacked.
Losing My e-Mail
In today's BlackBerry-driven, online business world, losing one's e-mail ' and access to other online forms of communication ' has to be worse than REM's fear of losing one's religion. Yet that is just the fate that may await our next President, who has already publicly confessed (on national television, no less, though you can certainly find the story on the Internet) his steadfast inability to shake his smoking addiction under the stress of a Presidential campaign.

MOST POPULAR STORIES

  • The 'Sophisticated Insured' Defense
    A majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.
    Read More ›
  • Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric Code
    In an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.
    Read More ›