Features
Cybersecurity in Commercial Equipment Leases
<b><i>Hidden Liability for the Unwary Lessor</i></b><p>Much has been written in the industry about equipment lessors' cybersecurity practices for the protection of their information. The issue addressed herein is the equipment lessor's obligations and potential liability for information stored on equipment returned to the lessor at the end of a lease.
Features
<i>Legal Tech</i><br> What Microsoft's Recent Office 365 and Security Updates Mean for Legal
<b><i>From New Reporting Functionality to Cross-Application Tagging and Security Features, the New Updates Aim to Round Out Office 365's Information Governance and Cybersecurity Features</b></i><p>In a bid to appeal to legal professionals, Microsoft has updated Office 365 with information governance, security, and e-discovery capabilities, and encouraged legal technology integration with its platform.
Features
Cyber Disaster Recovery
<b><i>How to Take a Law Firm Beyond Insurance</i></b><p>With expectations for an always-on law firm, significant challenges within the legal industry to maintain competitiveness and perform due practice for cybersecurity and other disaster scenarios come from both clients and regulatory bodies.
Features
3D Printing, Sharing Economy, and Other Emerging Industries
<b><i>Do You Have Adequate Coverage?</b></i><p>Most traditional or "legacy" insurance products fail to provide sufficient coverage for certain risk exposures vis-à-vis the 3D printing industry, just as they fail to adequately protect businesses in other emerging industries that, along with their concomitant risks, simply did not exist when the legacy insurance products covering them were formulated.
Features
Data Security and Data Breach Response Continue to Be a Hot Issue
<b><i>Lessons from 2017 Enforcement Actions and Guidance</b></i><p>Regulators including the FTC, the Department of Health and Human Services Office of Civil Rights (OCR) — the agency responsible for enforcing the HIPAA rules for protected health information (PHI) — and state attorneys general have issued guidance and announced a number of settlements in data security cases that are instructive about measures that organizations can take to reduce the potential for a data breach or, if a breach does occur, provide appropriate notice.
Features
Security First Approach Provides a Significant Advantage to Law Firms
The security industry all too often sells the next shiny object touted as the Holy Grail of security that protects against all cyber threats. And the following year, the next best thing hits the market and becomes the grail until proven fallible.
Features
Equifax Breach Will Fuel Identity Theft Remediation Debate
In the wake of suits filed against Equifax by consumers, businesses and governmental units, courts will have to grapple with the question of what remedies are appropriate. These issues are not unique to the Equifax incident, but the scope of the breach will undoubtedly lead to more debate than ever before.
Features
Bitcoin Is Fueling the Ransomware Epidemic
Money is a powerful motivator, but it alone wasn't enough to fuel the ransomware epidemic. After all, the first documented ransomware infection was in 1989, but it remained relatively unknown until its resurgence over the past five years. So what changed? In short, bitcoin.
Features
The Myth of the Secure Cloud
“There's really no such thing as the cloud, there are only other people's computers.” This may have been true at first; but it is now worth some investigation if the present threat environment today demands a secure cloud.
Features
DRaaS: How It Takes a Law Firm's DR Beyond Insurance
With expectations for an always-on law firm, significant challenges within the legal industry to maintain competitiveness and perform due practice for cybersecurity and other disaster scenarios come from both clients and regulatory bodies. A comprehensive approach with an end-to-end availability strategy is imperative to mitigate the threats of downtime. And yet, this is easier said than done.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- The Binding Effect of Plea Agreements In White Collar CrimesFederal plea agreements sometimes state explicitly that they are limited to that one office and do not bind other U.S. attorney's offices. In this article, we discuss the circuit courts' competing approaches to interpreting the binding effect of plea agreements and the Department of Justice policy.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›
- The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business AlliesPractical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.Read More ›