NEXT

Albert Barsocchini

Albert Barsocchini

August 23, 2009 | Corporate Counsel

Preserve in Place vs. Collect to Preserve

What should a company do?

By Albert Barsocchini

5 minute read

May 17, 2009 | Corporate Counsel

Voice of the Corporation: The 30(b)(6) Witness

E-discovery has made the 30(b)(6) witness an invaluable tool.

By Albert Barsocchini

5 minute read

January 02, 2012 | Texas Lawyer

Six Tips to Safeguard Your Mobile Devices

Mobile devices pose significant risks for sensitive corporate information. As lawyers become more dependent on mobile devices for their practice, they need to be cognizant of the significant security risk these devices present.

By Albert Barsocchini

2 minute read

January 02, 2012 | Legaltech News

Six Tips to Safeguard Your Mobile Devices

Responding to ViaForensics recently released Mobile Risk Security Report, consultant Albert Barsocchini offers six tips to protect your mobile privacy.

By Albert Barsocchini

2 minute read

December 01, 2003 | Legaltech News

Data Collection Standards

EDD methodology is about to change dramatically.

By Albert Barsocchini

4 minute read

January 05, 2012 | Texas Lawyer

Six Tips to Safeguard Your Mobile Devices

Mobile devices pose significant risks for sensitive corporate information. As lawyers become more dependent on mobile devices for their practice, they need to be cognizant of the significant security risk these devices present.

By Albert Barsocchini

2 minute read

March 13, 2013 | Legaltech News

We Are in It Together

As competition among service providers and law firms heats up, cooperation remains the key to a successful e-discovery engagement. That is why it is important to always be clear about roles and responsibilities between vendor and law firm in this challenging environment. [MORE]

By Albert Barsocchini

4 minute read

January 06, 2012 | Daily Business Review

Six tips to safeguard your mobile devices

Mobile devices pose significant risks for sensitive corporate information. As lawyers become more dependent on mobile devices for their practice, they need to be cognizant of the significant security risk these devices present.

By Albert Barsocchini

3 minute read

December 11, 2012 | Legaltech News

Book Review: 'Hacking Web Apps'

It has never been easier to initiate a hack with devastating consequences. This is reflected by a number of books including Mike Schema's Hacking Web Apps, which focuses on eight groups of security weaknesses and vulnerabilities most commonly exploited by hackers and more importantly, it explains how to guard against such attacks.

By Albert Barsocchini

3 minute read

July 01, 2003 | Legaltech News

First Steps…

By Connie Nichols and Albert Barsocchini

1 minute read