Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,165 results for "Cybersecurity Law & Strategy"...

Closing the Information Security Gaps In the New Operational Model
June 01, 2021
In 2020, law firms did what they had to do to continue serving their clients. Information governance may have been sacrificed in the face of an urgent, global crisis. As understandable as that is, it's time now to step back and assess best practices for the new operational model that is here to stay.
Mastery of Information: How to Successfully Manage Ungoverned Data for Risk Mitigation
June 01, 2021
Companies are collecting and managing more data than ever, essentially in order to create value, thus in effect making every company a "data" company. But for data to provide value, organizations need to know where it is, who has access to it, how it's managed, including its longevity value, and how it needs to be secured and protected.
Best Practices for Investigations In Remote Environments
June 01, 2021
With regulatory and investigations activity expected to pick up significantly in the coming year, it's more important than ever to tighten up remote investigations methods to meet best practices. Aside from enabling continuity during COVID-19 restrictions, remote workflows offer a number of benefits in investigations.
Expectation of Privacy In Surveillance Cameras
June 01, 2021
Recently, the Pennsylvania Supreme Court held that audio interceptions did not violate the rights of the defendant under the Wiretap Act, and so were admissible. The Supreme Court drew a proper and logical conclusion from the facts and the law and, hopefully, brought us closer to a reasonable look at the issue, but we still have a long way to go.
One Solution on How the U.S. Government Can Compete for Top Cybersecurity Professionals
June 01, 2021
While the private sector is undeniably in great need of cybersecurity professionals, the public sector must compete for the limited supply of qualified candidates, particularly those capable of filling high-level positions.
Legal Tech: EU E-discovery 'Phenomenon' Comes With Unique Issues
June 01, 2021
For a jurisdiction with little to no discovery process, the EU and its stringent privacy requirements may have already emerged as the next frontier for e-discovery providers looking to expand their business outside of the United States. However, the region's relative inexperience with e-discovery could still emerge as a hindrance for vendors eyeing an EU-based expansion.
How Should Directors Respond to the SolarWinds Attack
May 01, 2021
This article is not about "who did what wrong" or "what nation-state commenced this attack." It's really more about is, "if I am a Director, what should I be thinking about the SolarWinds attack?"
The Situation of Your Company's CISO and How It Impacts Data Security
May 01, 2021
The intensity of information security briefings often leads to organizations tucking the CISO under the CIO instead. After all, all technology is related, right? This is a huge mistake, and it is wreaking havoc on American data security.
The Unheralded Value of a Contract
May 01, 2021
The most important part of a contract is the data that it generates. If you take all that data from each contract, then aggregate, organize and analyze it, you will have critical insights into the overall effectiveness of your contracting process and the way you transact business.
Should Your Clients' Involvement With Cryptocurrency Scare You?
May 01, 2021
It's not a matter of whether you have an interest in crypto, think it's all a bizarre techno-bubble, the eventual replacement for fiat currency, or somewhere in between. The fact of the matter is your clients, and future clients, are more likely than ever to have a connection to this market, and a brief review of the headlines can make this prospect seem terrifying.

MOST POPULAR STORIES