Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,145 results for "Cybersecurity Law & Strategy"...

Legal Tech: Moving to the Cloud for Business Continuity Planning
January 01, 2019
In the past year, the devastation caused by natural disasters has been immense. Law firms, like every other business, are left to deal with the aftermath of these catastrophic events. Firms that have established business continuity plans to put into effect when these instances occur will find themselves a step ahead in the disaster recovery process. And the ones leveraging cloud technology are at an even greater advantage.
Risks in Online Collection of Children's Data
January 01, 2019
As convenient, useful and cool mobile technology and interconnected devices are, they come with risks that remain largely unseen or, worse, ignored. Some pose security risks and privacy risk, like those present in voice-activated devices — especially for children. For manufacturers, they also pose regulatory litigation and insurance risks, especially when children end up using their “smart” products.
Big Law's Trojan Horse: Are the Big Four Preparing an Invasion?
January 01, 2019
<b><i>Law Firms Partner With the Big Four to Serve Their Clients, But the Accountants Pose an Existential Threat. What Will Happen If — or When — They Turn Competitive?</b></i><p>For law firm leaders, rank-and-file partners and everyone else in the law firm ecosystem, the Big Four shouldn't be a laughing matter. They are serious about selling legal services, and clients are listening.
Sticking a Hand in the Internet Cookie Jar
December 01, 2018
Why Collecting Children's Online Data is a Risk As convenient, useful and cool mobile technology and interconnected devices are, they come with risks that remain largely unseen or, worse, ignored. For manufacturers, they also pose regulatory litigation, and insurance risks, especially when children end up using their "smart" products.
Are You Prepared? Dealing with GDPR-like Rules Spreading Across the Nation
December 01, 2018
California's Consumer Privacy Act, signed into law earlier this year, follows a growing line of consumer privacy laws, such as the European General Data Protection Regulations (GDPR), Canadian Breach of Security Safeguards Regulations of the Personal Information Protection and Electronic Documents Act (PIPEDA), and related New York Department of Financial Services Cybersecurity Rules and Regulations (NYCRR 500).
Right Out of the Box: California Enacts First-of-its-Kind Statute Regulating Internet-of-Things
December 01, 2018
<b><i>Companies Impacted By California's SB-327 — Especially Manufacturers and Distributors of IoT Devices — Should Work to Ensure Compliance With the Act As Soon As Possible If Regulatory Fallout Is to Be Avoided Come January 2020</b></i><p>While a great deal of attention has focused on the California Consumer Privacy Act, California also passed a less-publicized, but highly critical, statute that will regulate certain aspects of Internet of Things device security.
How Legal Teams Can Leverage AI
December 01, 2018
Artificial intelligence and automation are creeping into the workplace of every industry, bringing the added benefits of efficiency and security. As more organizations implement AI solutions across their departments, businesses still relying on outdated, manual processes will fall behind.
The Blockchain Can Finally Secure Supply Chains Against Cyberattacks
December 01, 2018
Cyber criminals looking for new ways to exploit company networks are turning their focus to the privileged network access given to the many players involved in supply chains. As supply ecosystems grow, and points of vulnerability proliferate, businesses will have to turn to distributed ledger technology.
Worried About Complying with ABA Opinion 483 on Cybersecurity? Fear No More
December 01, 2018
In response to the omnipresent threat of cyberattacks, the ABA issued Formal Opinion 483, which addresses the obligations imposed upon lawyers to safeguard their clients' data. Here's how to achieve compliance.
Legal Tech: Cloud and Security Considerations for e-Discovery
December 01, 2018
E-discovery presents some special considerations that need to be examined before deciding what is best for your organization and really taking a stand in the on-premises vs. cloud debate.

MOST POPULAR STORIES

  • Yachts, Jets, Horses & Hooch: Specialized Commercial Leasing Models
    Defining commercial real estate asset class is essentially a property explaining how it identifies — not necessarily what its original intention was or what others think it ought to be. This article discusses, from a general issue-spot and contextual analysis perspective, how lawyers ought to think about specialized leasing formats and the regulatory backdrops that may inform what the documentation needs to contain for compliance purposes.
    Read More ›
  • Identifying Your Practice's Differentiator
    How to Convey Your Merits In a Way That Earns Trust, Clients and Distinctions Just as no two individuals have the exact same face, no two lawyers practice in their respective fields or serve clients in the exact same way. Think of this as a "Unique Value Proposition." Internal consideration about what you uniquely bring to your clients, colleagues, firm and industry can provide untold benefits for your law practice.
    Read More ›
  • Risks and Ad Fraud Protection In Digital Advertising
    The ever-evolving digital marketing landscape, coupled with the industry-wide adoption of programmatic advertising, poses a significant threat to the effectiveness and integrity of digital advertising campaigns. This article explores various risks to digital advertising from pixel stuffing and ad stacking to domain spoofing and bots. It will also explore what should be done to ensure ad fraud protection and improve effectiveness.
    Read More ›