Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,145 results for "Cybersecurity Law & Strategy"...

Law Firms Grapple With Cybersecurity Issues and Regulatory Risks
May 01, 2016
Security is always a concern for law firms, and the risks have only grown in recent years. Increasingly, attorneys, staff and clients have become more mobile and rely on an array of laptops, smartphones and tablets to stay connected 24/7. As more data is created and resides in more places, it becomes more vulnerable.
EU Approves GDPR
May 01, 2016
Coming off the heels of the EU Article 29 Working Party Opinion on the Privacy Shield, the EU Parliament passed the General Data Protection Regulation (GDPR) on April 15, which overhauls the union's Data Protection Directive rules set forth in 1995. This regulation applies to all business and organizations targeting EU consumers, regardless of their geographic location.
EXCITING NEWS!!!
May 01, 2016
Beginning with the June Issue, <i>e-Commerce Law &amp; Strategy</i> will no longer exist as a single entity. Instead, it will continue its evolution into our all-new, cutting-edge title: <i>Cybersecurity Law &amp; Strategy</i>.
Law Firms Grapple With Cybersecurity Issues and Regulatory Risks
May 01, 2016
Security is always a concern for law firms, and the risks have only grown in recent years. Increasingly, attorneys, staff and clients have become more mobile and rely on an array of laptops, smartphones and tablets to stay connected 24/7. As more data is created and resides in more places, it becomes more vulnerable.
Cybersecurity Meets EDRM with the Cybersecurity Reference Model
April 01, 2016
Many legal technology practitioners have great familiarity with the Electronic Discovery Reference Model (EDRM). The model allows attorneys and those who support them to use a common lexicon while wrestling with the complex issues and tasks associated with the discovery process. As the legal technology industry moves deeper into commoditization, new skills, knowledge bases and technology related to security and privacy outside the traditional EDRM will increasingly become the focal point for professional development.
Mitigating Data Breach Risk
April 01, 2016
Today's legal departments are undergoing fundamental changes thanks in part to the imminent threat of ongoing cyberattacks. Given the massive breaches at some of the world's visible brands ' Anthem, Blue Cross Blue Shield, Experian and Sony Pictures Entertainment, to name just some of the most notorious recent victims ' it is increasingly clear that cybersecurity can no longer be regarded as the exclusive domain of IT.
Leasing Can Make Your Information Security Processes Bullet Proof
April 01, 2016
Security issues are cited repeatedly as the number one concern for law firms and most recently topped all other current trends. This year, firms are estimated to spend more than $6.9 million or 1.92% of their gross annual revenues on information security.
Information Sharing for the Information Age
April 01, 2016
As 2015 drew to a close, Congress agreed on a federal budget. That simple act, coming on the heels of a series of contentious continuing resolutions, was big news. But tucked away on page 694 of that 887-page bill was perhaps a more significant achievement. There Congress inserted, passed, and the President signed, the Cybersecurity Act of 2015.
CFPB Takes Step Into Cybersecurity Regulation
April 01, 2016
The Consumer Financial Protection Bureau (CFPB) has fired a shot across the bow of the burgeoning online-payment industry, taking an enforcement action this week that marked the agency's first foray into regulating cybersecurity.
<b><i>Online Extra:</b></i> Cybersecurity Professionals Apprehensive on Government Access to Encrypted Data
March 31, 2016
A recent survey of security professionals takes these concerns to a new level, with 81% of respondents reporting they think it's 'very likely' or 'certain' that hackers can take advantage of the government's capability to access encypted data.

MOST POPULAR STORIES

  • Yachts, Jets, Horses & Hooch: Specialized Commercial Leasing Models
    Defining commercial real estate asset class is essentially a property explaining how it identifies — not necessarily what its original intention was or what others think it ought to be. This article discusses, from a general issue-spot and contextual analysis perspective, how lawyers ought to think about specialized leasing formats and the regulatory backdrops that may inform what the documentation needs to contain for compliance purposes.
    Read More ›
  • Identifying Your Practice's Differentiator
    How to Convey Your Merits In a Way That Earns Trust, Clients and Distinctions Just as no two individuals have the exact same face, no two lawyers practice in their respective fields or serve clients in the exact same way. Think of this as a "Unique Value Proposition." Internal consideration about what you uniquely bring to your clients, colleagues, firm and industry can provide untold benefits for your law practice.
    Read More ›
  • Risks and Ad Fraud Protection In Digital Advertising
    The ever-evolving digital marketing landscape, coupled with the industry-wide adoption of programmatic advertising, poses a significant threat to the effectiveness and integrity of digital advertising campaigns. This article explores various risks to digital advertising from pixel stuffing and ad stacking to domain spoofing and bots. It will also explore what should be done to ensure ad fraud protection and improve effectiveness.
    Read More ›