Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Effectively Managing Increasing Client Security Requirements

By Christopher Perrotta
December 01, 2019

From server-filled data centers dotting the countryside to the phones in our pockets (not to mention those in our cars, homes and offices), computers are almost everywhere. In the course of extending this digital realm in which we work and play to business and industry, our most intimate and confidential data has been widely digitized, monetized and shared. It might be said that the value of our personally identifiable information is only now being recognized and the protections appropriate to that value being demanded. Diamonds get armed guards. What does your banking information deserve?

Gone are the days of basic security precautions like simply installing antivirus software and having a dedicated IT team. Today is the era of two-factor authentication, longer and stronger passwords, clean desk policies, mobile device management, network encryption and partnering with the right vendor to perform security scans and audits to keep your business ahead of hackers and malicious actors. Defense-in-depth is an old but increasingly relevant concept and strategy.

Gone, too, are the days of naively assuming our confidential data is secure. Increasingly, clients, stakeholders, regulators and others are demanding proof that firms are actively protecting the PII to which they have access, and this evidence is being demanded both before and after security incidents. In fact, such audits are likely to occur for many firms without a cyberattack being the trigger.

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
How Secure Is the AI System Your Law Firm Is Using? Image

In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.

COVID-19 and Lease Negotiations: Early Termination Provisions Image

During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.

Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary Support Image

The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.

The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business Allies Image

Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.

Authentic Communications Today Increase Success for Value-Driven Clients Image

As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.