Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,237 results for "Cybersecurity Law & Strategy"...

Cybersecurity Lawyers Getting Plenty of Company
High-profile data breaches in the past few years have been a wakeup call for corporate America ' and made cybersecurity and data privacy the next "it" practice for lawyers. There's been a gold rush to the field, practitioners say ' and the potential rewards have attracted some Johnny-come-latelies and pushed attorneys to seek out new ways of distinguishing themselves as experts.
<b><i>Online Extra:</b></i> FTC Sued Over Refusal to Disclose Data Security Policies
' The Federal Trade Commission (FTC) was sued last month for refusing to turn over information about how the agency decides to bring data security cases. The Freedom of Information Act suit by Philip Reitinger, a former Department of Homeland Security official who is now president of a cybersecurity company, comes as the FTC'defends its role as data security cop'in two ongoing cases. &#133;
<b><i>Online Extra:</b></i> Data Breaches on Track to Cost Companies $2.1 Trillion
As more corporate infrastructure moves online, new research suggests the rising number and impact of data breaches will cost $2.1 trillion globally by 2019, almost four times the estimated cost of breaches in 2015.
The Internet User's Duty of Care
The duty one Internet user has to another has changed, particularly with respect to cyber-security and privacy. Negligence by Internet users has enabled hackers and creators of viruses to exploit computer systems and engage in crime and unwanted computer intrusions.
Deritivative Cyber Litigation
Potential liability for data breaches has emerged as a major concern for businesses in the past few years as massive cyber-attacks are increasing, with companies that use or store private customer data electronically or use social media as part of their marketing strategy being the prime targets.
Disputes over Insurance Coverage for Alleged TCPA Violations
During the past several years, there has been an increase in the number of lawsuits that allege violations of the Telephone Consumer Protection Act ("TCPA"), and a corresponding increase in the number of coverage disputes over TCPA liabilities.
Securing a Document Review Center: A Practical Guide
Much ink has been spilled in recent years about information security, hacker exploits and hardware and software products used to thwart hackers. Not a single day goes by without news pertaining to the discovery of vulnerabilities in the software we use and cherish, and to hacker exploits affecting the companies we use in our daily lives.
Cybercrime
Just when you thought that it could not get worse for companies in the context of cybersecurity and privacy issues ' it does. Below, we review the sobering news about cyberattacks and provide some tips when considering insurance for cyber risk.
<b><i>Online Extra:</b></i> DOJ Releases Cybersecurity Best Practices
Dealing with cybersecurity in the United States is challenging for many reasons, but one of the most frequently cited pain points is the patchwork of laws governing the space. Depending on your corporation's industry, consumer base and location, your legal requirements following a significant breach can change dramatically. The Department of Justice (DOJ) is now stepping up to help, setting a list of best practices organizations should bear in mind if and when they are&#133;
<b><i>Online Extra:</b></i> Up to Senate to Vote on Cybersecurity Legislation
Following the recent approval by the House of Representatives of two controversial cybersecurity bills, it is now up to the Senate to move forward on its proposal, which would encourage the sharing of cyberthreat information.

MOST POPULAR STORIES

  • The 'Sophisticated Insured' Defense
    A majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.
    Read More ›
  • Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric Code
    In an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.
    Read More ›