Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,230 results for "Cybersecurity Law & Strategy"...

Valuable Information Security Lessons from <i>Olympus Mortgage vs. Guaranteed Rate</i>
Earlier this year, a jury awarded Mount Olympus Mortgage Company (MOMC) more than $25 million for its claims against Guaranteed Rate, which alleged Guaranteed ' along with other former employees of MOMC ' illegally transferred hundreds of loan files from MOMC's internal systems to Guaranteed. The award is notable for showcasing how important it is for a company to maintain control of its data security, both from external threats and employees.
European Data Protection Supervisor Suggests Path After Parliament Dismisses Privacy Shield Draft
On May 26, coming less than two months after the Article 29 Working Party rebuke of the Privacy Shield, the EU parliament voted 501 to 119 on a resolution calling for negotiations on the agreement to continue. Its criticisms of the text echoed that of the Working Party, namely the Privacy Shield's insufficiency in dealing with U.S. mass surveillance, protecting EU individual data rights and protections, and effectively enforcing its regulations.
Benefits and Risks of the Internet of Things
The buzz phrase "Internet of Things" is seemingly everywhere. What is it, what can it do for us, and what concerns does it present? More specifically, while the Internet of Things (IoT) presents tremendous opportunities for businesses, are there corresponding risks, or elements of the IoT that businesses should consider staying away from?
Navigating New Terrain: Law Firms Facing Unprecedented Cyber Risk
For years, various government authorities and security experts warned the legal industry about the proverbial cyber target painted on their chest. Given nebulous reporting legislations, the data breaches at law firms remained below the press horizon. But you can only dodge so many bullets until one hits the industry square in the chest.
International Cybersecurity Compliance Concerns
Compared with the rest of the world, the United States has historically been a more open framework when dealing with information. Social media has made even the most mundane and possibly personal pieces of data available to many with a press of a finger. Such an open relinquishment of private information is almost assumed and has become part of the American culture. Those who think about how easy it is to access data understand how their own data has become part of the searchable cyberspace.
<b><i>e-Discovery and Security</b></i> The Inevitable Reinvention of the e-Discovery Industry
The e-discovery industry is on the precipice of major change yet again, and this time it is all about security. What will distinguish the winners from the losers in the next few years will be an organization's ability to do one of three things: consolidate, innovate or reinvent.
EU Cybersecurity Directive Update
Cyber attacks and IT security breaches are being constantly reported (the "Panama Papers" being the most recent spectacular example), and almost certainly represent just the tip of the iceberg. No one can doubt that cybersecurity is a very significant global issue with cybercrime a major international menace ' any statistics about these issues always make for grim reading.
FCC's Proposed Rulemaking For Broadband Internet Access Providers
In 2015, the FCC issued its Open Internet Order, applying Section 222 of the federal Communications Act to broadband Internet access services (BIAS), and in doing so took jurisdiction over privacy and data security matters for Internet Service Providers (ISPs). Having taken on BIAS, the Commission needed to address the FCC's privacy and data protection regulatory scheme.
Cyber Security Challenges and Potential Uninsured Exposures
This article provides a broad overview of cyber security challenges, and the insurance coverage (or lack thereof) for the financial impact of those cyber security challenges.
Measure to Manage: Understanding and Using Data to Affect Firm Change and Client Relationships
Organized and meaningful data has been leveraged in progressive organizations for years, but now that data and information is highly accessible and easily consumable via the ever-expanding digital mesh, enterprise-level expectations and related legal business impact have been elevated. With this new reality come many questions.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • A 'Cloud Security Doctrine' for Law Firms
    Cloud computing may be here to stay, but is it truly safer than the solutions that it's outmoding? The Legal Cloud Computing Association (LCCA) thinks there's a path to greater security, publishing for law firms its first "Cloud Security Doctrine."
    Read More ›
  • Artist Challenges Copyright Office Refusal to Register Award-Winning AI-Assisted Work
    Copyright law has long struggled to keep pace with advances in technology, and the debate around the copyrightability of AI-assisted works is no exception. At issue is the human authorship requirement: the principle that a work must have a human author to be eligible for copyright protection. While the Copyright Office has previously cited this "bedrock requirement of copyright" to reject registrations, recent decisions have focused on the role of human authorship in the context of AI.
    Read More ›
  • IP News
    Federal Circuit: PTAB Did Not Err In Finding That It Retained Authority to Issue Final Written Decision After Deadline Passed Federal Circuit: District Court Did Not Err In Finding That an Abbreviated New Drug Application Is Limited to the Uses Described Therein
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›