NEXT
Search Results

0 results for 'Office Depot Inc'

You can use to get even better search results
December 08, 2015 |

Defining a Data Breach Response Plan Starts with Understanding

Upcoming cyberSecure panel discusses the baseline for a plan and the trigger points of a response.
4 minute read
December 08, 2015 | Law.com

Defining a Data Breach Response Plan Starts with Understanding

Upcoming cyberSecure panel discusses the baseline for a plan and the trigger points of a response.
4 minute read
November 24, 2015 |

Anthem Fires Back at Data-Breach Suit

Lawyers for the nation's second-largest insurer argue that affected customers can't prove they were harmed.
2 minute read
November 24, 2015 |

Inadmissible

Sent Home. All Tolled. Watched Watchers.
5 minute read
November 24, 2015 | Law.com

Anthem Fires Back at Data-Breach Suit

Lawyers for the nation's second-largest insurer argue that affected customers can't prove they were harmed.
2 minute read
November 24, 2015 | Law.com

Inadmissible

Sent Home. All Tolled. Watched Watchers.
5 minute read
November 10, 2015 |

Cybersecurity Breach: The Threat From Within

Matthew Oliver, Amy Komoroski Wiwi and Natalie Dallavalle write: While the classic image behind data breaches is a shadowy hacker, a real risk, accidental or otherwise, is much more visible—your own employees. The insider presents a multifaceted threat. The employee's motivations could be activist, personal, or simple carelessness. And let's not forget that the insider is not necessarily someone sitting down the hall: It could be any third-party vendor who has access to a company's network for services.
7 minute read
November 09, 2015 | Law.com

Cybersecurity Breach: The Threat From Within

Matthew Oliver, Amy Komoroski Wiwi and Natalie Dallavalle write: While the classic image behind data breaches is a shadowy hacker, a real risk, accidental or otherwise, is much more visible—your own employees. The insider presents a multifaceted threat. The employee's motivations could be activist, personal, or simple carelessness. And let's not forget that the insider is not necessarily someone sitting down the hall: It could be any third-party vendor who has access to a company's network for services.
7 minute read
November 09, 2015 |

Key Considerations for Obtaining Insurance Coverage for Internal Investigations

Joseph I. Lieberman, Robin L. Cohen and Daniel J. Fetterman of Kasowitz, Benson, Torres & Friedman write: Companies facing the prospect of an internal investigation should not overlook the availability of insurance coverage to pay for some or all of the expenses incurred. Companies should plan ahead so that they have put themselves in the best position possible to have the investigative fees and costs covered.
11 minute read

Resources

  • 2024 Report: State of AI in Legal

    Brought to you by Ironclad

    Download Now

  • Blueprint for Successful Second Request Document Review

    Brought to you by Integreon

    Download Now

  • Employee Happiness Playbook: The 3 R's for Business Success in 2024

    Brought to you by Amazing Workplace, Inc.

    Download Now

  • The Positive Impact of AI at Small Law Firms: 4 Key Insights

    Brought to you by LexisNexis®

    Download Now