Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,145 results for "Cybersecurity Law & Strategy"...

CISA Passes: What It Means for Organizations and Their Data
November 30, 2015
The Cybersecurity Information Sharing Act (CISA) was passed by the Senate on Oct. 27, and while it still has a few hoops to jump through before it is enacted into law, the hotly debated proposed rules may considerably impact both those organizations holding sensitive data and the users to which that data belongs.
'Internet of Things' Litigation and Regulatory Risk
November 30, 2015
Most lawyers have heard of the "Internet of Things." Business leaders, after all, are busy making the Internet of Things (IoT) the next great wave of innovation to sweep across the global economy. Apple, AT&T, Cisco, General Electric, Google, Honeywell, Intel, Microsoft, Oracle, Panasonic, Samsung, and scores of others have been investing in the IoT for years. With current predictions of a $15 trillion IoT market in fewer than 10 years, it is easy to understand why so many industry giants have made the IoT a strategic priority.
Training Tomorrow's Lawyer
November 30, 2015
There's math and technology involved? Count me out, that's why I went to law school." The attorneys in the room nod at each other, smiling at this joke that more than a few of us have told at one point in our careers. But it looks like this joke has finally run its course. The practice of law is not immune to technological advances, especially in the areas of research methodologies and, of course, electronic discovery.
Mobile Mayhem: Smartphones and Security (Or the Lack Thereof)
November 30, 2015
A company that cares at all about its data needs to stay abreast of the security risks mobile devices engender. There are many ways to combine policy and technology in ways that address these risks ' at least by identifying them and adapting appropriately.
Movers & Shakers
November 29, 2015
A Collection of Moves in the Cybersecurity and Privacy Practice Areas
<b><i>Online Extra:</b></i> Cyber Attacks Demand Rapid Response, ACC Panel Says
November 02, 2015
Be ready and act fast. That's the advice a panel on cybersecurity attacks at the Association of Corporate Counsel's annual meeting last month told in-house lawyers.
<b><i>Online Extra:</b></i> Millennials Distrust Data Protection Methods Employed By Common Online Services: Study
November 02, 2015
As digital natives, millennials have a major stake in how information is stored and protected by the organizations they share it with. But despite having contributed a vast amount of data to the global ecosystem (in some cases since before they could walk), it turns out that members of Gen Y feel that businesses and government organizations fail to meet their expectations when is comes cybersecurity.
Safe Harbor European Court Data Protection Ruling
November 02, 2015
On Oct. 6 of this year, the European Court of Justice (ECJ) gave a very important judgment about EU data protection law in the so-called Schrems case, where it ruled that the EU Safe Harbor regime is invalid and that EU Member State data protection regulators have the power to investigate complaints about the adequacy of the level of protection of data transfers to the U.S.
Heightened Cybersecurity Concerns Impact IP Strategies
November 02, 2015
Recent widely reported cybersecurity breaches have further heightened awareness of the issue, which is of significantly increasing concern both to businesses and government. Government regulators have pressed for greater cybersecurity efforts ' with the FTC's authority in this area being recently upheld by the Third Circuit.
SEC Potentially Targets CCOs for Cybersecurity Lapses
November 02, 2015
Two recent speeches by Securities and Exchange Commission (SEC) officials likely got the attention of every Chief Compliance Officer (CCO). CCOs would be well advised to carefully review and implement where appropriate the SEC's latest cybersecurity guidance.

MOST POPULAR STORIES

  • Yachts, Jets, Horses & Hooch: Specialized Commercial Leasing Models
    Defining commercial real estate asset class is essentially a property explaining how it identifies — not necessarily what its original intention was or what others think it ought to be. This article discusses, from a general issue-spot and contextual analysis perspective, how lawyers ought to think about specialized leasing formats and the regulatory backdrops that may inform what the documentation needs to contain for compliance purposes.
    Read More ›
  • Identifying Your Practice's Differentiator
    How to Convey Your Merits In a Way That Earns Trust, Clients and Distinctions Just as no two individuals have the exact same face, no two lawyers practice in their respective fields or serve clients in the exact same way. Think of this as a "Unique Value Proposition." Internal consideration about what you uniquely bring to your clients, colleagues, firm and industry can provide untold benefits for your law practice.
    Read More ›
  • Risks and Ad Fraud Protection In Digital Advertising
    The ever-evolving digital marketing landscape, coupled with the industry-wide adoption of programmatic advertising, poses a significant threat to the effectiveness and integrity of digital advertising campaigns. This article explores various risks to digital advertising from pixel stuffing and ad stacking to domain spoofing and bots. It will also explore what should be done to ensure ad fraud protection and improve effectiveness.
    Read More ›