Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,145 results for "Cybersecurity Law & Strategy"...

Data Security Breaches
February 28, 2015
In April 2014, the U.S. District Court for the District of New Jersey decided that the FTC could pursue a claim that a hotel company's failure to have adequate data security measures is an unfair trade practice. The agency believes that data security is a basic responsibility of any company that accepts consumer personal information.
<b><i>Online Extra</b></i> Turning Cybersecurity Into a Serious 'Game of Threats'
February 02, 2015
The last few years have seen some creative new methods of getting businesses engaged in protecting their networks and data. PricewaterhouseCoopers has created a cybersecurity computer game. PwC's 'Game of Threats' walks businesspeople, playing either as a team of nefarious hackers or as a company being attacked, through the important decisions they have to make during a breach, in hopes of giving them a deeper knowledge of cybersecurity and its challenges.
Can Computers Practice Law?
January 31, 2015
Can computers practice law? Many are inclined to say yes when using them affects us in so many ways. When scanning the pages of LJN's Legal Tech Newsletter , we learn a good deal about the use of computers in the practice of law, but what I am really asking here is how far can ' or will ' we go to automate dispute resolution?
The Internet of (Legal) Things
January 31, 2015
Welcome to the "Internet of Things" (IoT) ' the Web of embedded computing devices that interact with our everyday lives. Like any technology revolution, those devices have no interest in waiting for the legal world to catch up. As a result, if a General Counsel's wearable device measuring nighttime biorhythms does not keep her awake at night, the prospect of billions of devices sensing everything about her customers and employees during an era of cyber insecurity probably will.
Obama Calls for Student Privacy Standards
January 31, 2015
In a speech before the Federal Trade Commission on Jan. 12, President Barack Obama called for the passage of a Student Digital Privacy Act that would allow student-related information to be collected only for educational purposes, not for marketing.
Movers & Shakers
January 30, 2015
A Collection of Moves in the Cybersecurity and Privacy Practice Areas
Keeping an Eye on the Federal Trade Commission's View on Data Security Breaches by Companies
December 31, 2014
In recent weeks, the entertainment industry has been rattled by the hacking and public release beginning in November of a massive amount of internal documents and e-mails from Sony Pictures Entertainment. By mid-December, the incident had already generated several class action lawsuits, alleging negligence and violation of state statutes. But the frequent hacking of consumer information is a liability issue that entertainment companies must be prepared for, too.
The Case for the GC
December 31, 2014
In a time of increasing regulatory risk, global complexity and shareholder activism, the role of the corporate general counsel in the boardroom has never been more important. Yet, companies have been slow to recruit general counsels or seasoned attorneys to serve as independent directors.
The Internet of (Legal) Things
November 30, 2014
Technology research firms such as Gartner predict that, in five to 10 years, the number of smart devices will balloon to more than 26 billion. Welcome to the "Internet of Things" (IoT) ' the web of embedded computing devices that interact with our everyday lives.
Don't Be Afraid of Cybersecurity Information Sharing
November 02, 2014
Recent government action has shown that the White House and Congress are keenly aware of the potential data security benefits of robust information sharing between and among the private sector and the government. In recent years, information sharing bills have been introduced regularly in both the Senate and the House in an effort to encourage the flow of cyberthreat data between the private sector and the government.

MOST POPULAR STORIES

  • Yachts, Jets, Horses & Hooch: Specialized Commercial Leasing Models
    Defining commercial real estate asset class is essentially a property explaining how it identifies — not necessarily what its original intention was or what others think it ought to be. This article discusses, from a general issue-spot and contextual analysis perspective, how lawyers ought to think about specialized leasing formats and the regulatory backdrops that may inform what the documentation needs to contain for compliance purposes.
    Read More ›
  • Identifying Your Practice's Differentiator
    How to Convey Your Merits In a Way That Earns Trust, Clients and Distinctions Just as no two individuals have the exact same face, no two lawyers practice in their respective fields or serve clients in the exact same way. Think of this as a "Unique Value Proposition." Internal consideration about what you uniquely bring to your clients, colleagues, firm and industry can provide untold benefits for your law practice.
    Read More ›
  • Risks and Ad Fraud Protection In Digital Advertising
    The ever-evolving digital marketing landscape, coupled with the industry-wide adoption of programmatic advertising, poses a significant threat to the effectiveness and integrity of digital advertising campaigns. This article explores various risks to digital advertising from pixel stuffing and ad stacking to domain spoofing and bots. It will also explore what should be done to ensure ad fraud protection and improve effectiveness.
    Read More ›