Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,215 results for "Cybersecurity Law & Strategy"...

International Cybersecurity Compliance Concerns
July 01, 2016
Social media has made even the most mundane and possibly personal pieces of data available to many with a press of a finger. Such an open relinquishment of private information is almost assumed, and has become part of the American culture. Those who think about how easy it is to access data understand how their own data has become part of the searchable cyberspace.
Under the Radar Industries Prime for Cyber Hackers
July 01, 2016
It is no surprise to anyone that certain industries are more of a target for cyber criminals than others, although today all businesses are likely on the radar. The financial institutions and large retailers usually get most of the attention. However, four industries are high-value targets, and lag behind the preparation curve: hospitality, healthcare, higher education and legal.
<b><i>Legal Tech: Case Study</b></i> Jackson Walker Forges Ahead in an Ambitious Quest to Permanently Replace the Paper File
July 01, 2016
It was just five years ago when our managing partner, Wade Cooper, shared his long-term vision for Jackson Walker's file management strategy. He challenged us to stop talking about going paperless and actually do something about it.
What Do Law Firms Need to Know About Cloud Cybersecurity?
July 01, 2016
Here's the premise: The cloud is a fundamental technology solution option that truly solves all kinds of law firm business and legal IT challenges including innovation, security, governance, global availability, etc. Modern law firms want the efficiency, the security and the global access of the cloud, while satisfying the security demands of their clients.
Making Informed Choices about the Deep, Dark Web
July 01, 2016
A majority of Internet traffic and online data lives beneath the surface of the Web as we know it. In the darkest, hidden recesses of the Internet, individuals engage in illicit activities and cybercrimes, but also in substantial activism, journalism and sensitive communications.
Valuable Information Security Lessons from <i>Olympus Mortgage vs. Guaranteed Rate</i>
July 01, 2016
Earlier this year, a jury awarded Mount Olympus Mortgage Company (MOMC) more than $25 million for its claims against Guaranteed Rate, which alleged Guaranteed ' along with other former employees of MOMC ' illegally transferred hundreds of loan files from MOMC's internal systems to Guaranteed. The award is notable for showcasing how important it is for a company to maintain control of its data security, both from external threats and employees.
European Data Protection Supervisor Suggests Path After Parliament Dismisses Privacy Shield Draft
July 01, 2016
On May 26, coming less than two months after the Article 29 Working Party rebuke of the Privacy Shield, the EU parliament voted 501 to 119 on a resolution calling for negotiations on the agreement to continue. Its criticisms of the text echoed that of the Working Party, namely the Privacy Shield's insufficiency in dealing with U.S. mass surveillance, protecting EU individual data rights and protections, and effectively enforcing its regulations.
Benefits and Risks of the Internet of Things
June 01, 2016
The buzz phrase "Internet of Things" is seemingly everywhere. What is it, what can it do for us, and what concerns does it present? More specifically, while the Internet of Things (IoT) presents tremendous opportunities for businesses, are there corresponding risks, or elements of the IoT that businesses should consider staying away from?
Navigating New Terrain: Law Firms Facing Unprecedented Cyber Risk
June 01, 2016
For years, various government authorities and security experts warned the legal industry about the proverbial cyber target painted on their chest. Given nebulous reporting legislations, the data breaches at law firms remained below the press horizon. But you can only dodge so many bullets until one hits the industry square in the chest.
International Cybersecurity Compliance Concerns
June 01, 2016
Compared with the rest of the world, the United States has historically been a more open framework when dealing with information. Social media has made even the most mundane and possibly personal pieces of data available to many with a press of a finger. Such an open relinquishment of private information is almost assumed and has become part of the American culture. Those who think about how easy it is to access data understand how their own data has become part of the searchable cyberspace.

MOST POPULAR STORIES

  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Anti-Assignment Override Provisions
    UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?
    Read More ›
  • Chambers & Partners: What's New After Sale
    On Nov. 10, 2023, Abry Partners, a leading North American middle market private equity firm, announced that it had acquired Chambers & Partners for $449 million from Inflexion, the UK private equity firm that purchased Chambers in 2018. What will this mean?
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›