Features
Law Firm Security Goes Back to School
Armed with technical and regulatory weapons for preventing cyber crimes, law firms must administer policies to protect client data and use the systems and services held standard by industries like medicine and banking. No one knows when disruption will take place. New methods of adverse action force executives to make more choices and decisions. All departments must merge their vigilance and join with IT services as IT takes center stage in order to stay prepared.
Features
How Law Firms and Legal Departments Can Protect Against Meltdown and Spectre
In January, news of the Meltdown and Spectre vulnerabilities rocked the cybersecurity world. And even a few months later, the news is still reverberating, due to several patches that are significantly slowing down device and system performance. To learn more about these vulnerabilities and how law firms and legal departments can protect against them now and in in the future, I sat down with Dana Simberkoff, Chief Risk, Privacy and Information Security Officer at AvePoint.
Features
China's Cybersecurity Law Isn't Just About Cybersecurity
The law — which includes data localization mandates, cybersecurity best practices, and data transfer restrictions — has similarities to other cyber laws such as the EU's General Data Protection Regulation (GDPR). But in this case, it's also being used to police internet content and behavior.
Features
Supreme Court Asked, Again, to Weigh In on Data Breach Standing as Circuit Split Widens
CareFirst, a large health care company involved in a data breach case, asked the U.S. Supreme Court to weigh in on whether victims can establish Article III standing to sue for the risk of future identity theft. The Court denied the request, leaving intact a recent district court holding that consumers could successfully plead such a claim issue — and leaving a split among the federal appellate courts.
Features
<i>Case Study:</i> How Mesa Systems Resolved Its Phishing Issues
Phishing is a constantly changing landscape, which requires unwavering attention and focus.
Features
<i>Online Extra</i>: e-Discovery Pioneer, Judge Andrew Peck, Retires
<b><i>One of e-Discovery's Most Influential Figures</b></i><p>After over two decades as a magistrate judge for the Southern District of New York, Peck will retire and join DLA Piper.
Features
<i>e-Discovery:</i> Four Cases Highlighting e-Discovery Trends in the Second Half of 2017
In the second half of 2017, case law served to clarify what does and does not constitute reasonable policies and procedures for preserving information subject to discovery — as well as the risks you run if you fail to follow through on those policies.
Features
Use of the Blockchain to Contract Digitally
Smart contracts are self-executing agreements written in code on the blockchain. Parties contract digitally using distributed ledger technology. This article offers a layperson's, non-technical summary of the underlying technology and consideration of certain legal implications for smart-contracting and contract management.
Features
Law Firm Security Q&A
With the Appleby data breach still top of mind of many law firm and legal department professionals, cybersecurity has become a major area of concern. To learn more about how law firms can protect themselves against cyber attacks and data breaches, we sat down with Laurie Fischer, managing director at HBR Consulting.
Features
Second Edition ABA Cybersecurity Handbook Reflects the Need for Greater Awareness
As 2017 came to a close, the American Bar Association opened the next chapter in cybersecurity awareness with the release of the second edition of its…
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- The Binding Effect of Plea Agreements In White Collar CrimesFederal plea agreements sometimes state explicitly that they are limited to that one office and do not bind other U.S. attorney's offices. In this article, we discuss the circuit courts' competing approaches to interpreting the binding effect of plea agreements and the Department of Justice policy.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›
- Authentic Communications Today Increase Success for Value-Driven ClientsAs the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.Read More ›