Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,215 results for "Cybersecurity Law & Strategy"...

CISA Passes: What It Means for Organizations and Their Data
November 30, 2015
The Cybersecurity Information Sharing Act (CISA) was passed by the Senate on Oct. 27, and while it still has a few hoops to jump through before it is enacted into law, the hotly debated proposed rules may considerably impact both those organizations holding sensitive data and the users to which that data belongs.
'Internet of Things' Litigation and Regulatory Risk
November 30, 2015
Most lawyers have heard of the "Internet of Things." Business leaders, after all, are busy making the Internet of Things (IoT) the next great wave of innovation to sweep across the global economy. Apple, AT&T, Cisco, General Electric, Google, Honeywell, Intel, Microsoft, Oracle, Panasonic, Samsung, and scores of others have been investing in the IoT for years. With current predictions of a $15 trillion IoT market in fewer than 10 years, it is easy to understand why so many industry giants have made the IoT a strategic priority.
Training Tomorrow's Lawyer
November 30, 2015
There's math and technology involved? Count me out, that's why I went to law school." The attorneys in the room nod at each other, smiling at this joke that more than a few of us have told at one point in our careers. But it looks like this joke has finally run its course. The practice of law is not immune to technological advances, especially in the areas of research methodologies and, of course, electronic discovery.
Mobile Mayhem: Smartphones and Security (Or the Lack Thereof)
November 30, 2015
A company that cares at all about its data needs to stay abreast of the security risks mobile devices engender. There are many ways to combine policy and technology in ways that address these risks ' at least by identifying them and adapting appropriately.
Movers & Shakers
November 29, 2015
A Collection of Moves in the Cybersecurity and Privacy Practice Areas
<b><i>Online Extra:</b></i> Cyber Attacks Demand Rapid Response, ACC Panel Says
November 02, 2015
Be ready and act fast. That's the advice a panel on cybersecurity attacks at the Association of Corporate Counsel's annual meeting last month told in-house lawyers.
<b><i>Online Extra:</b></i> Millennials Distrust Data Protection Methods Employed By Common Online Services: Study
November 02, 2015
As digital natives, millennials have a major stake in how information is stored and protected by the organizations they share it with. But despite having contributed a vast amount of data to the global ecosystem (in some cases since before they could walk), it turns out that members of Gen Y feel that businesses and government organizations fail to meet their expectations when is comes cybersecurity.
Safe Harbor European Court Data Protection Ruling
November 02, 2015
On Oct. 6 of this year, the European Court of Justice (ECJ) gave a very important judgment about EU data protection law in the so-called Schrems case, where it ruled that the EU Safe Harbor regime is invalid and that EU Member State data protection regulators have the power to investigate complaints about the adequacy of the level of protection of data transfers to the U.S.
Heightened Cybersecurity Concerns Impact IP Strategies
November 02, 2015
Recent widely reported cybersecurity breaches have further heightened awareness of the issue, which is of significantly increasing concern both to businesses and government. Government regulators have pressed for greater cybersecurity efforts ' with the FTC's authority in this area being recently upheld by the Third Circuit.
SEC Potentially Targets CCOs for Cybersecurity Lapses
November 02, 2015
Two recent speeches by Securities and Exchange Commission (SEC) officials likely got the attention of every Chief Compliance Officer (CCO). CCOs would be well advised to carefully review and implement where appropriate the SEC's latest cybersecurity guidance.

MOST POPULAR STORIES

  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Anti-Assignment Override Provisions
    UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?
    Read More ›
  • Chambers & Partners: What's New After Sale
    On Nov. 10, 2023, Abry Partners, a leading North American middle market private equity firm, announced that it had acquired Chambers & Partners for $449 million from Inflexion, the UK private equity firm that purchased Chambers in 2018. What will this mean?
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›