Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,165 results for "Cybersecurity Law & Strategy"...

Five Smart Steps to Prepare for GDPR Data Subject Rights
December 01, 2017
Many corporations around the globe are preparing for May 2018, when Europe's General Data Protection Regulation (GDPR) enforcement kicks in. The regulation encompasses a wide range of nuanced privacy requirements that can be challenging to operationalize. In particular, requirements around the rights of European data subjects — which include the right to be forgotten and rights to access, rectification and objection to processing — will be some of the most difficult to address.
What Lies Beneath the Surface: The Dark Web
December 01, 2017
Nearly all of us access the World Wide Web on at least a daily basis. Yet for many of us, there is a fundamental lack of knowledge about the basic structure of the Internet and the way its different levels interact. This article provides a basic outline of the structure of the Web and some insight as to the purpose for and content housed on each level, as well as give some practical tips to avoid your company's data from ending up on the Dark Web.
Wave of Sexual Misconduct Claims Warrants Looks at Confidentiality, Nondisclosure Agreements
December 01, 2017
Companies try to protect their reputations from executives who have "gone wild" by including moral turpitude clauses as a basis to terminate executives for cause under their employment agreements. Similarly, in the context of employment disputes, companies try to protect themselves through the use of non-disclosure, non-disparagement and confidentiality provisions in settlement agreements.
Ransomware: What to Do When It Happens to You
December 01, 2017
In the event that your company is the victim of a ransomware attack, this article provides steps to be taken as part of its response to such an incident.
Social Media: Questions of Admissibility and Ethics
December 01, 2017
<b><i>Part Two of a Two-Part Article</i></b><p>Social media evidence can be acquired both informally — through an attorney's own investigation or from the client — or more formally through the use of discovery and the rules of discovery. While each gives rise to practical and ethical issues, this article focuses on informal methods of acquisition.
Security First Approach Provides a Significant Advantage to Law Firms
December 01, 2017
Security first is a holistic approach that views security not as an information technology nuisance in need of tight cost-management controls, but as a competitive advantage to differentiation from traditional business offerings. Here's what you need to know.
Podcast: Phishing
November 02, 2017
Phishing is one of the more pervasive cyber attacks in the world, and while we've all received phishing emails, phishing attacks have become more sophisticated and come in different forms other than emails from Persian princes.
What Lies Beneath the Surface: The Dark Web
November 02, 2017
This article provides a basic outline of the structure of the Web and some insight as to the purpose for and content housed on each level, as well as give some practical tips to avoid your company's data from ending up on the Dark Web.
When Products Start Teaching Cybersecurity Process
November 02, 2017
<b><i>New Nuix Cybersecurity Training and Certification Point to Pivot Not Only In Company But In Community At Large</b></i><p>Getting certifications from Nuix is no longer just about mastery of its engine. With a new certification coming to market next quarter, Nuix, like many in the ESI and forensic space (namely Guidance Software, now OpenText), is shifting gears and driving directly into the race for cybersecurity supremacy in an evolving and currently fractured technology marketplace.
The Dark Web
November 02, 2017
The goals of this article are: 1) to provide a basic outline of the structure of the Web and to provide some insight into the purpose for and content housed on each level; and 2) to give some practical tips on preventing your company's data from ending up on the Dark Web.

MOST POPULAR STORIES