Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,237 results for "Cybersecurity Law & Strategy"...

Mobile Mayhem: Smartphones and Security (Or the Lack Thereof)
BYOD implementation can come in a wide variety of different formulations, but it essentially means that employees are choosing their own hardware and, to one degree or another, mixing personal and business use on a device. This means personal devices with no control from employers other than perhaps some unmonitored, unenforced, and mostly unread policy guidance.
Prioritizing e-Mail Security in the Legal Sector
Data breaches and cyberattacks aren't new occurrences, but it can sometimes feel like they are. It's only in the last few years that we've seen these attacks make headlines more and more, increasing in both quantity and impact.
CISA Passes: What It Means for Organizations and Their Data
The Cybersecurity Information Sharing Act (CISA) was passed by the Senate on Oct. 27, and while it still has a few hoops to jump through before it is enacted into law, the hotly debated proposed rules may considerably impact both those organizations holding sensitive data and the users to which that data belongs.
'Internet of Things' Litigation and Regulatory Risk
Most lawyers have heard of the "Internet of Things." Business leaders, after all, are busy making the Internet of Things (IoT) the next great wave of innovation to sweep across the global economy. Apple, AT&T, Cisco, General Electric, Google, Honeywell, Intel, Microsoft, Oracle, Panasonic, Samsung, and scores of others have been investing in the IoT for years. With current predictions of a $15 trillion IoT market in fewer than 10 years, it is easy to understand why so many industry giants have made the IoT a strategic priority.
Training Tomorrow's Lawyer
There's math and technology involved? Count me out, that's why I went to law school." The attorneys in the room nod at each other, smiling at this joke that more than a few of us have told at one point in our careers. But it looks like this joke has finally run its course. The practice of law is not immune to technological advances, especially in the areas of research methodologies and, of course, electronic discovery.
Mobile Mayhem: Smartphones and Security (Or the Lack Thereof)
A company that cares at all about its data needs to stay abreast of the security risks mobile devices engender. There are many ways to combine policy and technology in ways that address these risks ' at least by identifying them and adapting appropriately.
Movers & Shakers
A Collection of Moves in the Cybersecurity and Privacy Practice Areas
<b><i>Online Extra:</b></i> Cyber Attacks Demand Rapid Response, ACC Panel Says
Be ready and act fast. That's the advice a panel on cybersecurity attacks at the Association of Corporate Counsel's annual meeting last month told in-house lawyers.
<b><i>Online Extra:</b></i> Millennials Distrust Data Protection Methods Employed By Common Online Services: Study
As digital natives, millennials have a major stake in how information is stored and protected by the organizations they share it with. But despite having contributed a vast amount of data to the global ecosystem (in some cases since before they could walk), it turns out that members of Gen Y feel that businesses and government organizations fail to meet their expectations when is comes cybersecurity.
Safe Harbor European Court Data Protection Ruling
On Oct. 6 of this year, the European Court of Justice (ECJ) gave a very important judgment about EU data protection law in the so-called Schrems case, where it ruled that the EU Safe Harbor regime is invalid and that EU Member State data protection regulators have the power to investigate complaints about the adequacy of the level of protection of data transfers to the U.S.

MOST POPULAR STORIES

  • The 'Sophisticated Insured' Defense
    A majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.
    Read More ›
  • Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric Code
    In an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.
    Read More ›