Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,145 results for "Cybersecurity Law & Strategy"...

Five Steps to a Successful Social Media Strategy
August 01, 2016
Have you heard? Social media is mainstream ' 70% of the U.S.are using social media and more than 50% of them are over the age of 35 (that's right ' it's not just millennials). But did you know that in-house counsel are active social media participants? In fact, their usage is growing and today nearly two-thirds of general counsel (GCs) are engaging at least weekly in social media for professional reasons.
The Enemy Is Inside the Wire
August 01, 2016
By now you've likely read the headlines about the recent attacks on various Asian banks, resulting in cyber losses reported in the tens of billions. And if you're really paying attention, you probably know these attacks have been linked to the Lazarus cybercrime organization, which was also identified as the likely culprit behind the attacks on Sony in 2014. In all likelihood, you read the headlines, and then you moved on to read the latest sports scores. Why? Because it doesn't relate to you. Or does it?
<b><i>Legal Tech:</b></i> Contracting with a Fintech Company
August 01, 2016
Your favorite internal client has just messaged you about a new contract that needs a rush review. The counterparty is reportedly one of the hottest new "fintech" companies in Silicon Valley. You are the master of all things vendor contract-related in your shop, but perhaps this is the first fintech contract to cross your desk. This article addresses some of the special issues that might be presented by this sort of contract.
Sullivan & Worcester's Advancement Think Tank
August 01, 2016
This article explores Sullivan &amp; Worcester's content development initiative experiment from the marketing and professional development perspectives. A group of about eight senior associates, were charged with developing the content.
Movers & Shakers
August 01, 2016
A Collection of Moves in the Cybersecurity and Privacy Practice Areas
Cyber News
August 01, 2016
Microsoft Proposes Norms for Fighting Cyberbreaches <br>China's Proposed Data Localization Cybersecurity Law Catches Eye of U.S. Tech Companies<br>Brown University Offers New Graduate Program In Cybersecurity Leadership
<b><i>Breaking News:</b></i> Microsoft Prevails on Appeal in Dodging Warrant for Foreign E-mails
July 15, 2016
Microsoft and other U.S.-based internet service providers won a major victory on July 14 at the U.S. Court of Appeals for the Second Circuit, which reversed a lower court in finding the company is not required to comply with a U.S. warrant for customer e-mails stored on a server in Dublin.
<b><i>Breaking News:</b></i> Privacy Shield Approved by EU Member States, Set to Land Next Week
July 11, 2016
The Privacy Shield, a transatlantic agreement that would regulate data transfers between the EU and U.S., has been approved by EU member states as one of the last steps in its process to implementation.
The Internet of Things
July 01, 2016
The buzz phrase "Internet of Things" is seemingly everywhere. What is it, what can it do for us, and what concerns does it present? More specifically, while the Internet of Things ("IoT," for short) presents tremendous opportunities for businesses, are there corresponding risks, or elements of the IoT that businesses should consider staying away from?
<b><i>Legal Tech</b></i> Could Federal Courts' Inherent Powers Upend the New Amendments to Rule 37(e)?
July 01, 2016
The recent amendments to the Federal Rules of Civil Procedure completely overhauled the sanctions portion of Rule 37, and were designed to resolve conflicts on the standards to apply in ordering spoliation sanctions. But one recent decision indicates that neither may be the debate on the standards a federal court can employ in ruling on a spoliation motion.

MOST POPULAR STORIES

  • Yachts, Jets, Horses & Hooch: Specialized Commercial Leasing Models
    Defining commercial real estate asset class is essentially a property explaining how it identifies — not necessarily what its original intention was or what others think it ought to be. This article discusses, from a general issue-spot and contextual analysis perspective, how lawyers ought to think about specialized leasing formats and the regulatory backdrops that may inform what the documentation needs to contain for compliance purposes.
    Read More ›
  • Identifying Your Practice's Differentiator
    How to Convey Your Merits In a Way That Earns Trust, Clients and Distinctions Just as no two individuals have the exact same face, no two lawyers practice in their respective fields or serve clients in the exact same way. Think of this as a "Unique Value Proposition." Internal consideration about what you uniquely bring to your clients, colleagues, firm and industry can provide untold benefits for your law practice.
    Read More ›
  • Risks and Ad Fraud Protection In Digital Advertising
    The ever-evolving digital marketing landscape, coupled with the industry-wide adoption of programmatic advertising, poses a significant threat to the effectiveness and integrity of digital advertising campaigns. This article explores various risks to digital advertising from pixel stuffing and ad stacking to domain spoofing and bots. It will also explore what should be done to ensure ad fraud protection and improve effectiveness.
    Read More ›