Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,145 results for "Cybersecurity Law & Strategy"...

<i>Legal Tech</i><br>Sedona Conference Releases Finalized Third Edition of the Sedona Principles
November 02, 2017
<b><i>The Often-Cited e-Discovery Guidelines Were 'Put Through the Ringer,' and the Result Is Updated Principles and Expanded Commentary for a New Technological Age</b></i><p>Outside of guiding rules of evidence and procedure, the Sedona Principles are perhaps the most often-cited guidelines for handling electronic discovery today. But the Principles had not seen a full-scale rewrite since 2007. Since that time, electronic data sources have exponentially increased and e-discovery itself has morphed into a $10 billion business. The wait, though, has come to a close.
New-Wave Legal Challenges for Bitcoin and Other Cryptocurrencies
November 02, 2017
As the adoption of cryptocurrencies spreads throughout the business and financial sectors, so too do the concerns that lack of regulation render the new-age currency susceptible to fraud, manipulation, and to being used as a vehicle for money laundering. Nevertheless, recent efforts by U.S. enforcement agencies to apply and enforce financial regulations mean greater scrutiny than ever before.
Social Media: Questions of Admissibility and Ethics
November 02, 2017
<b><i>Part One of a Two-Part Article</i></b><p>This two-part article is divided into three sections: 1) Social media, defined; 2) Examples of how social media has been used in family law cases; and 3) Ethical considerations for attorneys who gather social media evidence.
Cybersecurity in Commercial Equipment Leases
November 02, 2017
<b><i>Hidden Liability for the Unwary Lessor</i></b><p>Much has been written in the industry about equipment lessors' cybersecurity practices for the protection of their information. The issue addressed herein is the equipment lessor's obligations and potential liability for information stored on equipment returned to the lessor at the end of a lease.
<i>Legal Tech</i><br> What Microsoft's Recent Office 365 and Security Updates Mean for Legal
November 02, 2017
<b><i>From New Reporting Functionality to Cross-Application Tagging and Security Features, the New Updates Aim to Round Out Office 365's Information Governance and Cybersecurity Features</b></i><p>In a bid to appeal to legal professionals, Microsoft has updated Office 365 with information governance, security, and e-discovery capabilities, and encouraged legal technology integration with its platform.
Cyber Disaster Recovery
November 02, 2017
<b><i>How to Take a Law Firm Beyond Insurance</i></b><p>With expectations for an always-on law firm, significant challenges within the legal industry to maintain competitiveness and perform due practice for cybersecurity and other disaster scenarios come from both clients and regulatory bodies.
3D Printing, Sharing Economy, and Other Emerging Industries
November 02, 2017
<b><i>Do You Have Adequate Coverage?</b></i><p>Most traditional or "legacy" insurance products fail to provide sufficient coverage for certain risk exposures vis-à-vis the 3D printing industry, just as they fail to adequately protect businesses in other emerging industries that, along with their concomitant risks, simply did not exist when the legacy insurance products covering them were formulated.
Data Security and Data Breach Response Continue to Be a Hot Issue
November 01, 2017
<b><i>Lessons from 2017 Enforcement Actions and Guidance</b></i><p>Regulators including the FTC, the Department of Health and Human Services Office of Civil Rights (OCR) — the agency responsible for enforcing the HIPAA rules for protected health information (PHI) — and state attorneys general have issued guidance and announced a number of settlements in data security cases that are instructive about measures that organizations can take to reduce the potential for a data breach or, if a breach does occur, provide appropriate notice.
Security First Approach Provides a Significant Advantage to Law Firms
November 01, 2017
The security industry all too often sells the next shiny object touted as the Holy Grail of security that protects against all cyber threats. And the following year, the next best thing hits the market and becomes the grail until proven fallible.
Equifax Breach Will Fuel Identity Theft Remediation Debate
November 01, 2017
In the wake of suits filed against Equifax by consumers, businesses and governmental units, courts will have to grapple with the question of what remedies are appropriate. These issues are not unique to the Equifax incident, but the scope of the breach will undoubtedly lead to more debate than ever before.

MOST POPULAR STORIES

  • Yachts, Jets, Horses & Hooch: Specialized Commercial Leasing Models
    Defining commercial real estate asset class is essentially a property explaining how it identifies — not necessarily what its original intention was or what others think it ought to be. This article discusses, from a general issue-spot and contextual analysis perspective, how lawyers ought to think about specialized leasing formats and the regulatory backdrops that may inform what the documentation needs to contain for compliance purposes.
    Read More ›
  • Identifying Your Practice's Differentiator
    How to Convey Your Merits In a Way That Earns Trust, Clients and Distinctions Just as no two individuals have the exact same face, no two lawyers practice in their respective fields or serve clients in the exact same way. Think of this as a "Unique Value Proposition." Internal consideration about what you uniquely bring to your clients, colleagues, firm and industry can provide untold benefits for your law practice.
    Read More ›
  • Risks and Ad Fraud Protection In Digital Advertising
    The ever-evolving digital marketing landscape, coupled with the industry-wide adoption of programmatic advertising, poses a significant threat to the effectiveness and integrity of digital advertising campaigns. This article explores various risks to digital advertising from pixel stuffing and ad stacking to domain spoofing and bots. It will also explore what should be done to ensure ad fraud protection and improve effectiveness.
    Read More ›