Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,215 results for "Cybersecurity Law & Strategy"...

An Analysis of Proposed Federal Cybersecurity Legislation
October 31, 2012
Michael Chertoff, the former head of the U.S. Department of Homeland Security (DHS), recently remarked that "cyber threats represent one of the most seriously disruptive challenges to national security since the onset of the nuclear age 60 years ago."
Cybersecurity Law Firms Needed to Combat Terrorism Threat
October 31, 2012
The next mass terrorism attack may not involve planes, trains or buildings. It very well may involve cyberspace and could be felt by Americans when their lights, computers or smart phones go on the fritz as networks are compromised.
U.S. Cybersecurity's Path from Legislative Debate to Executive Action
August 30, 2012
That some action is needed in the realm of cybersecurity is the one thing beyond debate. Over the last year, supporters of various versions of legislation have emphasized that the nation's critical infrastructure ' including electrical grids, water stations and telecommunications systems ' is a target for cyber-attacks.
20/20 Vision for All Lawyers' Future: The Ethical Duty to Stay Technically Competent
August 30, 2012
How many practicing lawyers today (at least those over the age of 40) studied metadata and data security in law school? How many today can discuss the ethical aspects of those issues? Those skills, and more, are required to practice law, according to resolutions passed in early August by the ABA House of Delegates.
Law Firms and Cyber Security
July 30, 2012
Just as those responsible for the Titanic were lulled into a false sense of confidence in the vessel's impenetrability, many law firms today similarly steam along with a false sense of security that the cybercrime lurking in today's electronic channels of commerce does not pose a potentially critical threat. Taking a lesson from history, firms would be well-served by a blunt assessment of the cyber security risks that surround them and whether course corrections could avert a modern-day commercial disaster.
'Hot' and 'Cold' Trends
July 27, 2012
Surviving in the "new normal" requires recognizing both "hot" and "cold" trends. Here is a look at significant trends affecting law firms.
Digital Copiers Don't Forget
May 29, 2012
Risk mitigation requires a good understanding of where the vulnerabilities are, and one that many companies have missed is the sensitive data that likely reside in the hard drive memories of printers, copiers, and fax machines.
Law Firms and Cyber Security
May 29, 2012
Many law firms today steam along with a false sense of security that the cybercrime lurking in today's electronic channels of commerce does not pose a potentially critical threat. They are wrong.
Digital Copiers Don't Forget
April 29, 2012
The measures discussed in this article can help organizations to manage the risks associated with operating in the digital environment. This is important because, in 2012, ignorance of what your copier remembers is no longer a defense.
SOPA Update
December 27, 2011
On Dec. 15 and 16, just as Congress was preparing to go dark until after the New Year, The U.S. House of Representatives Committee on the Judiciary held hearings on SOPA. And what seemed destined to be a long drawn-out fight by a few in attendance who were in opposition of passing the Bill against Committee Chairman and sponsor Lamar Smith (R-TX) and its many supporters, took a bizarre and sudden turn as Day 2 restarted after lunch ' and maybe more importantly, as Representatives' flights home for recess were in danger of being missed.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Legal Possession: What Does It Mean?
    Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
    Read More ›
  • The Unlicensed Real Estate Broker in New York: Beware
    The U.S. District Court for the Northern District of New York recently determined that because New York prohibits unlicensed real estate brokers from pursuing payment in its courts for services rendered, a plaintiff who performed real estate work for a client who then did not pay had no standing to sue.
    Read More ›