Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,145 results for "Cybersecurity Law & Strategy"...

Legal Tech: Six Years of Tracking E-Discovery Trends and Providers
August 01, 2020
For the past six years, the E-Discovery Unfiltered report to identify pricing patterns and preferences in electronic discovery, highlight projected investments in the sector, gauge the impact of the cloud, track shifting preferences in outsourcing and remote review, understand vendor selection criteria, and focus on the need for international ediscovery, among other trends.
Where Will the Needle Land?
August 01, 2020
COVID-19 Contact Tracing v. Protecting Personal Privacy As states roll back stay-at-home orders, contact tracing has quickly emerged as an essential tool to manage the spread of the coronavirus and allow the country to return to work safely. But innovative contact tracing methods raise a host of privacy concerns, forcing a reckoning with how we balance privacy and public health.
Legal Tech: The Intersection of E-Discovery and Cybersecurity: You've Come a Long Way, Baby
August 01, 2020
Data is an asset and a liability. It fits into both accounting columns and will not fail to be used against a corporate entity if not secured properly. Databases contain trade secrets, personally identifiable information, HIPAA-protected health care information, proprietary information and classified data. As the size of databases grew and the importance of data became more evident, one thing became apparent: the information stored in those repositories had to be kept secure.
Working Remotely? Here Are 4 Often-Overlooked Steps That Secure Your Data
July 01, 2020
By the time you read this, Americans will have been working from home for more than three months. This has never happened before in this country during the age of technology. As millions logged on to their home networks and personal devices in an attempt to keep their companies afloat, cybersecurity issues rose to the forefront of the many issues that companies had to manage.
Synchronizing Legal Hold Requirements With Consumer Requests for Data Deletion
July 01, 2020
The biggest challenge with any legal hold process is ensuring that potentially relevant data is actually preserved. But with evolving requirements for how data is managed by new data privacy laws like the CCPA and the GDPR, it's become harder to secure data by simply sending a legal hold and assuming the custodian will do their duty to preserve it.
Preparing for the LIBOR Phase Out: Contract Remediation Starts with Contract Intelligence
July 01, 2020
The London Interbank Offered Rate has long been the global basis for agreements that include a variable interest rate component. However, LIBOR would be replaced by other benchmarks by the end of 2021. Key to assessing risk of exposure, quantifying the financial impact, developing remediation plans and communicating material information to stakeholders will be the identification, analysis and remediation of LIBOR-based contracts.
How To Avoid Cybersecurity Challenges Brought On By the Pandemic
July 01, 2020
As the current pandemic has forced much of the world into virtual workforce mode, cybercriminals have seized on the uncertainty of the current times to launch new and creative offensives. Fears surrounding COVID-19 are high, conspiracy theories are running rampant, and cyberattackers are counting on stress and distraction to decrease our vigilance against intrusions.
French Law on Removing Objectionable Online Content Rejected As Too Broad
July 01, 2020
A new French law that would have required such social media platforms as Facebook to take down objectionable content within 24 hours has been rejected by France's Constitutional Council as a disproportionate response to the proliferation of hate speech online.
Lessons Learned from Recent FTC Data Security Enforcement Orders
July 01, 2020
Proposed class actions against Zoom are illustrative of a challenge many businesses face: what is "reasonable" data security? The FTC's key data-security-related enforcement can help guide businesses in developing their data security programs.
Legal Tech: How to Streamline Your eDiscovery and Plan for the Future 
July 01, 2020
At law firms, attorneys will need to sustain the high quality of work they do in normal times, albeit with reduced budgets. The good news is that with ediscovery — an essential but expensive part of the litigation process — advances in technology since America's last recession have made it possible to save money and time by adopting a more modernized and comprehensive approach.

MOST POPULAR STORIES

  • Yachts, Jets, Horses & Hooch: Specialized Commercial Leasing Models
    Defining commercial real estate asset class is essentially a property explaining how it identifies — not necessarily what its original intention was or what others think it ought to be. This article discusses, from a general issue-spot and contextual analysis perspective, how lawyers ought to think about specialized leasing formats and the regulatory backdrops that may inform what the documentation needs to contain for compliance purposes.
    Read More ›
  • Identifying Your Practice's Differentiator
    How to Convey Your Merits In a Way That Earns Trust, Clients and Distinctions Just as no two individuals have the exact same face, no two lawyers practice in their respective fields or serve clients in the exact same way. Think of this as a "Unique Value Proposition." Internal consideration about what you uniquely bring to your clients, colleagues, firm and industry can provide untold benefits for your law practice.
    Read More ›
  • Risks and Ad Fraud Protection In Digital Advertising
    The ever-evolving digital marketing landscape, coupled with the industry-wide adoption of programmatic advertising, poses a significant threat to the effectiveness and integrity of digital advertising campaigns. This article explores various risks to digital advertising from pixel stuffing and ad stacking to domain spoofing and bots. It will also explore what should be done to ensure ad fraud protection and improve effectiveness.
    Read More ›