Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,145 results for "Cybersecurity Law & Strategy"...

Landscape of Standalone Cybersecurity Policies Has Changed Due to Increased Risk and Scrutiny
February 01, 2022
Because the market is rapidly changing, policyholders should not expect that they'll be offered the same coverage at renewal. Policyholders should start their renewal process earlier going into this year's renewal so they have time to analyze new pricing, as well as new endorsements that may limit coverage and consider alternative forms, insurers, and policies to maximize coverage.
Inside Cryptocurrency Pump-and-Dump Schemes
February 01, 2022
Since the inception of cryptocurrency as a widely traded asset, there has been increasing opportunity to make money through market manipulation, specifically through classic pump-and-dump and related fraudulent schemes, and more specifically CPDs.
Legal Tech: Effective Preservation Measures In Litigation Readiness
February 01, 2022
Basic ESI preservation steps, including litigation holds, relevant source checklists, and follow up steps with custodians may not be enough in some instances. Given the frequency of data loss from custodial and non-custodial sources, companies should also consider incorporating remediation strategies into their approach to preservation to better ensure defensibility.
Insurance Fraud Remains Key Area of Government Focus
February 01, 2022
During the past year, there were important government reports examining the defrauding of health insurance programs, new trends and government initiatives relating to fraud, and insurance fraud cases involving significant numbers of defendants. When added together, it is not difficult to understand why insurance fraud remains such a key area of focus for government officials, carriers and attorneys.
More than Just a Purchase, a Partnership: Tips for Success with Cloud-based Practice Management In 2022
January 01, 2022
While functionality and features are important, there are a number of additional considerations when evaluating a practice management solution. Will your platform provider serve as a partner that will offer expert guidance and be invested in your ongoing success?
Predicting What 2022 Holds for Cybersecurity
January 01, 2022
Predictions aside, complacency is not an option if you plan to survive and thrive in 2022. Rest assured, the future of cybersecurity is bright, but it will come with its own set of challenges. We look forward into the future because the sooner we can start adapting strategy, policies, and technologies, the better off everyone will be in the long run.
Biometric Privacy: A Year In Review (2021) and The Year Ahead (2022)
January 01, 2022
The year started with Portland, Oregon's ban on the use of facial recognition technology by private entities in places of "public" accommodation. It concluded with the rendering of important appellate decisions on the Illinois Biometric Information Privacy Act. In the middle, was the continued flurry of litigation, class action settlements, and legislative activity.
Cybersecurity and Legal Tech In 2022: Predictions from the Field
January 01, 2022
It's still a dangerous cyber world as we enter 2022, but one that today's attorneys and legal technologists are prepared to tackle. Here's what they predict for cybersecurity, remote work, privacy and e-discovery in the new year.
Cybersecurity and Corporate Privacy Enforcement Is Focus of Feds
January 01, 2022
It started as a hushed rumor in the beltway, then became a known fact by those going to join the administration. And now we all know: The Biden administration has brought with it a renewed focus on data privacy and cybersecurity.
'Never Trust, Always Verify': Zero Trust Security
January 01, 2022
Recognizing the ever-increasing cyber threats to businesses, government entities, and individuals, the White House announced that Federal Civilian Executive Branch agencies must migrate toward Zero Trust Cybersecurity Architecture by September 2024. Under Zero Trust, trust is the ultimate vulnerability of any system and, therefore, trust has to be eliminated from a business' cybersecurity approach.

MOST POPULAR STORIES

  • Yachts, Jets, Horses & Hooch: Specialized Commercial Leasing Models
    Defining commercial real estate asset class is essentially a property explaining how it identifies — not necessarily what its original intention was or what others think it ought to be. This article discusses, from a general issue-spot and contextual analysis perspective, how lawyers ought to think about specialized leasing formats and the regulatory backdrops that may inform what the documentation needs to contain for compliance purposes.
    Read More ›
  • Identifying Your Practice's Differentiator
    How to Convey Your Merits In a Way That Earns Trust, Clients and Distinctions Just as no two individuals have the exact same face, no two lawyers practice in their respective fields or serve clients in the exact same way. Think of this as a "Unique Value Proposition." Internal consideration about what you uniquely bring to your clients, colleagues, firm and industry can provide untold benefits for your law practice.
    Read More ›
  • Risks and Ad Fraud Protection In Digital Advertising
    The ever-evolving digital marketing landscape, coupled with the industry-wide adoption of programmatic advertising, poses a significant threat to the effectiveness and integrity of digital advertising campaigns. This article explores various risks to digital advertising from pixel stuffing and ad stacking to domain spoofing and bots. It will also explore what should be done to ensure ad fraud protection and improve effectiveness.
    Read More ›