Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,215 results for "Cybersecurity Law & Strategy"...

<b><i>Online Extra:</b></i> Yahoo Security Breach Sparks Class Actions
September 30, 2016
At least six class actions have been filed against Yahoo! Inc. in the wake of last month's announcement of a security breach that compromised an estimated 500 million account holders.
<b><i>Online Extra:</b></i> Much Ado About 'Minimum Standards' for DFS Cybersecurity Regulation
September 30, 2016
The New York State Department of Financial Services (DFS) made headlines on by announcing a 'first-in-the-nation,' comprehensive cybersecurity regulation, which will mandate 16 'minimum standards' for the 4,000+ institutions operating under DFS jurisdiction. The regulation was released on Sept. 28.
<b><i>Breaking News:</b></i> Much Ado About 'Minimum Standards' for DFS Cybersecurity Regulation
September 26, 2016
The New York State Department of Financial Services (DFS) made headlines on by announcing a 'first-in-the-nation,' comprehensive cybersecurity regulation, which will mandate 16 'minimum standards' for the 4,000+ institutions operating under DFS jurisdiction. The regulation was released on Sept. 28.
<b><i>Online Extra:</b></i> British Billionaire's Suit Over Alleged Leak Offers First Test of Privacy Law
September 20, 2016
Gilbert Chagoury, a British billionaire and philanthropist was denied a visa last year to enter the United States because, according to the U.S. government, he was suspected of supporting terrorism. Chagoury denies the allegation, saying the U.S. Department of State relied on bad intelligence. And now he's suing federal agencies that he claims leaked information about him to a reporter. His suit is thought to be the first case brought under the Judicial Redress Act, which President Barack Obama signed in February.
The Internal Risks of Managing Client Matter Information
September 01, 2016
Why do so many law firms indulge in risky behavior when it comes to managing their clients' records and information?
<b><i>e-Discovery Tech:</b></i> Why the FRCP Amendments Mean Legal Teams Need Technology Now More Than Ever
September 01, 2016
Across organizations, a similar process (more or less) is followed when conducting e-discovery, but the steps often happen in quick succession or nearly simultaneously. The steps are loosely defined by the FRCP and the judicial interpretation that flows from them. The recent changes to the FRCP will inevitably result in the steps shifting and evolving in the coming months and years.
Is Your Printer A Gateway For Hackers? Five Tips for a Secure Printer
September 01, 2016
Printers can contain sensitive information, or can be an entry point for hackers. It's imperative that law firms shield printers against hackers.
<b><i>Legal Tech: Case Study</b></i> Getting Creative with the Relativity Platform: How to Save a Multibillion-Dollar Deal
September 01, 2016
Many know the Relativity platform as a tool that assists with litigation, specifically moving data across the EDRM, from legal hold, collection, and processing all the way through document review and production. However, its capabilities extend far beyond that.
Privacy and Security of Personal Information Collected by Employee Benefit Plans
September 01, 2016
High profile cyberattacks and data breaches have become routine occurrences. Cyber threats are so pervasive that many privacy and security experts advise that responsible parties ' like fiduciaries of employee benefit plans ' should prepare for <i>when</i> a data breach occurs, not <i>if</i>. Data collected by employee benefit plans includes sensitive information that makes them a particularly attractive target for cybercrime.
Sullivan & Worcester's Advancement Think Tank
September 01, 2016
This article explores a firm's content development initiative experiment from the marketing and professional development perspectives. A group of about eight senior associates, known as SWATT (Sullivan &amp; Worcester's Advancement Think Tank), were charged with developing the content. Here is their story.

MOST POPULAR STORIES

  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Anti-Assignment Override Provisions
    UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?
    Read More ›
  • Chambers & Partners: What's New After Sale
    On Nov. 10, 2023, Abry Partners, a leading North American middle market private equity firm, announced that it had acquired Chambers & Partners for $449 million from Inflexion, the UK private equity firm that purchased Chambers in 2018. What will this mean?
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›