Cyber Security – Privacy and Information Security Legal Blogs & News

Cyber Security – Privacy and Information Security Legal Blogs & News from IP & Privacy Lawyers & Law Firms – UK, US & Beyond.

In a volatile environment, where the dynamics of law governs the outcome of judicial decisions, corporate legal executives must continuously remain proactively compliant and vigilant in all areas of legal management and regulatory revisions. In such a sphere, complacency results in high cost incurrence, corporate framework collapse and irreparable disrepute. The Chief Litigation Officer Summit […]

{ 0 comments }

Who Gave Away Your Firm’s IP Today?

by PaulSimms on January 17, 2014

It Might Have Been You Every firm, company, organisation or body owns intellectual property and proprietary information. This is the stuff hackers and cyber criminals crave as much as your bank account details and PIN numbers, yet we seem amazingly cavalier about governing what may happen to it outside of our defended network. How many […]

{ 0 comments }

Does your firm need a hosted backup service?

by PaulSimms on January 14, 2014

As the majority of law firm owners and partners will be aware, a database can have a number of benefits. Not only can they help in being compliant with Lexcel or another standard but they can also ensure that no client information is lost, mislaid or added to the wrong file. In short, having a […]

{ 0 comments }

Are you currently monitoring your credit? Have you been the victim of identity theft before? Is identity theft on the rise? What can you do to make sure your identity, and the identity of your children, is protected from thieves? Knowing what to expect can help you protect yourself from being a victim and dealing […]

{ 0 comments }

Before modern technology, credit card often occurred as a result of thieves stealing purses, wallets, or searching through dumpsters in search of carbon copies of credit card imprints in order to gain financial data. However, due to the advancements in technology, thieves can now use a variety of ways to steal credit card information. Below […]

{ 0 comments }

The Cybersecurity Act of 2010 was created by Congress, with an aim to protect and modernize private and public sectors, from malicious persons. It was constructed because of concerns of cyber-attacks that have continued to plague networks in the US, and around the world. Every day, hackers are breaking into networks of individuals, businesses, and […]

{ 0 comments }

What is Considered Internet Theft?

by Kelly Kovacic on January 22, 2013

Internet theft has been on the rise over the last decade. As technology continues to grow, many criminals have developed a cottage industry of very lucrative cyber crimes. The illegal use, streaming and downloading of any web content, including personal information continues to be at the forefront of state and federal law legislation. Types of […]

{ 0 comments }

What if you were approached by a stranger who claimed to be a business mogul, and he told you that he could offer you an opportunity to invest just a little bit of your money and double or triple it within weeks or even days? At first, you might be skeptical, but what if he […]

{ 0 comments }

There’s no doubt that the Internet has helped millions of people around the world, but it has also opened up the door for criminals to victimize people in new ways. As a result, one of the newest and most dangerous threats to your security is online identity theft. Each year, identity thieves harm the lives […]

{ 0 comments }

Cyberstalking: Crime, or Just Being Plain Rude?

by Michelle on October 19, 2012

USlegal.com defines stalking as behavior that threatens or harasses another person continually, so that the victim sincerely believes the perpetrator will hurt him or her. Cyberstalking includes the element of using any type of electronic means to stalk a person. The crime differs slightly from cyberbullying, which occurs among students at a school. Cyberharassment v. […]

{ 0 comments }