Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,280 results for "Cybersecurity Law & Strategy"...

<b><i>e-Discovery Tech:</b></i> Why the FRCP Amendments Mean Legal Teams Need Technology Now More Than Ever
September 01, 2016
Across organizations, a similar process (more or less) is followed when conducting e-discovery, but the steps often happen in quick succession or nearly simultaneously. The steps are loosely defined by the FRCP and the judicial interpretation that flows from them. The recent changes to the FRCP will inevitably result in the steps shifting and evolving in the coming months and years.
Is Your Printer A Gateway For Hackers? Five Tips for a Secure Printer
September 01, 2016
Printers can contain sensitive information, or can be an entry point for hackers. It's imperative that law firms shield printers against hackers.
<b><i>Legal Tech: Case Study</b></i> Getting Creative with the Relativity Platform: How to Save a Multibillion-Dollar Deal
September 01, 2016
Many know the Relativity platform as a tool that assists with litigation, specifically moving data across the EDRM, from legal hold, collection, and processing all the way through document review and production. However, its capabilities extend far beyond that.
Privacy and Security of Personal Information Collected by Employee Benefit Plans
September 01, 2016
High profile cyberattacks and data breaches have become routine occurrences. Cyber threats are so pervasive that many privacy and security experts advise that responsible parties ' like fiduciaries of employee benefit plans ' should prepare for <i>when</i> a data breach occurs, not <i>if</i>. Data collected by employee benefit plans includes sensitive information that makes them a particularly attractive target for cybercrime.
Sullivan & Worcester's Advancement Think Tank
September 01, 2016
This article explores a firm's content development initiative experiment from the marketing and professional development perspectives. A group of about eight senior associates, known as SWATT (Sullivan &amp; Worcester's Advancement Think Tank), were charged with developing the content. Here is their story.
Cybersecurity Beyond Traditional Risk Management
September 01, 2016
At a recent CIO panel, an audience member asked the three of us on stage: "What do you see as your number one priority in the coming 12 months?" I responded "cybersecurity" without hesitation. The panelist that followed said that cybersecurity was a priority, but that it is a subset of risk management. This was not the first time I have heard the chief information pro and/or technologist in a large company make that point, and I have to respectfully disagree.
Movers & Shakers
September 01, 2016
A Collection of Moves in the Cybersecurity and Privacy Practice Areas
Tax Reporting Laws Raise Privacy Claim Risks for Online Companies
September 01, 2016
States are scrambling to shore up sales tax revenues that are eroding because of e-commerce sales. A new approach to sales tax collections involves information reports on customers' online purchases. This approach may create potential legal claims against many online companies for giving too much information about customers to state tax agencies or even to the customers themselves.
cyberSecure Conference
August 31, 2016
ALM's cyberSecure conference takes place Sept. 27-28 in New York. ALM cyberSecure is designed to provide business executives with the necessary tools to build and deploy a successful adaptive cybersecurity plan that comprehensively addresses detection, defense and response.
How to Understand and Protect the Data in Your Enterprise
August 01, 2016
Especially in a time where cybersecurity remains in the headlines on a regular basis, it's crucial to understand what data exists in order to protect it. Where's your data? What if you lost track of some of it? What if attackers copied it?

MOST POPULAR STORIES