Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,215 results for "Cybersecurity Law & Strategy"...

<b><i>Online Extra</b></i><br>Financial Industry Groups Slam NY's Proposed Cybersecurity Rules
December 01, 2016
Major banking and insurance industry groups are attacking New York's proposed regulation requiring member companies to adopt stringent protections against cyberattacks that compromise consumers' confidential information.
<b><i>Online Extra</b></i><br>HHS Cracks Down on Health Care Privacy Violations under HIPAA
December 01, 2016
The U.S. Department of Health and Human Services shattered previous records for enforcing the Health Insurance Portability and Accountability Act in fiscal year 2016, according to an analysis by McDermott Will & Emery health care attorneys.
Managing Risk in Light of 'Shadow IT'
November 01, 2016
Information Governance in the Age of Cloud Application Proliferation
Law Firms, Meet Your New Regulator: Your Clients
November 01, 2016
While major banks, retailers, hospitals and insurance companies were the brick and mortar of a growing media monument to hubris and cyber overconfidence, law firm breaches went mostly unnoticed. That is, until government agencies and law enforcement grew concerned that the wealth of intellectual property curated by law firms could be used to manipulate financial markets by front running trades.
Client Document Security Audits: Is Your Law Firm Ready?
November 01, 2016
It is essential for all law firms to safeguard their clients' documents against ever-evolving threats and thoroughly understand the security challenges and potential solutions in today's demanding world of legal document compliance.
Looking to the FFIEC Revised Information Security Booklet for Best Practices in Data Security for Financial Institutions
November 01, 2016
The Federal Financial Institutions Examination Council (FFIEC) recently revised its Information Security Booklet. The changes bring the financial services industry closer to the goal of having a clearly defined set of cybersecurity and data protection protocols to ensure regulatory compliance.
Legal Tech: e-Discovery: Judge Says 'NO' to Party's Bid to Force Use of Predictive Coding
November 01, 2016
Would Judge Peck's admiration and advocacy for predictive coding lead him, upon a request by the opposing party, to force a responding party to use it against that party's own wishes? Judge Peck recently faced this issue, putting potential use of predictive coding at odds with established precedent and procedure regarding how to conduct discovery.
Movers & Shakers
November 01, 2016
Movers &amp; Shakers&nbsp;Law firm Venable recently announced the addition of former AOL Inc. chief counsel, Charles D. Curran, as a partner in…
Introducing the Cybersecurity Reference Model
November 01, 2016
When EDRM and CSRM Collide, Much Is Illuminated About the Hiring Trends in Both e-Discovery and Cybersecurity
Sixth Circuit's Decision on Privacy Claims over Data Breaches
November 01, 2016
Data breaches such as the one Yahoo recently revealed (500 million accounts!) get the big headlines. In response, large companies double down on their efforts to protect the security of their data. But small to midsize businesses often fail to appreciate the risk of a data breach to their own business.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Impact of Disney's Motion to Compel Arbitration In Scarlett Johansson's Lawsuit Over 'Day-and-Date' Release of 'Black Widow'
    Johansson alleges that, in order to generate new subscribers for Disney+, Disney intentionally interfered with her talent agreement with Disney affiliate Marvel Studios for her featured role in Black Widow — and thus allegedly induced Marvel to breach a promise in the Johansson/Marvel agreement for the film to be initially distributed in exclusive "wide theatrical release." Updated Oct. 1 to reflect a confidential settlement reached in the case.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›