August 23, 2009 | Corporate Counsel
Preserve in Place vs. Collect to PreserveWhat should a company do?
By Albert Barsocchini
5 minute read
May 17, 2009 | Corporate Counsel
Voice of the Corporation: The 30(b)(6) WitnessE-discovery has made the 30(b)(6) witness an invaluable tool.
By Albert Barsocchini
5 minute read
January 02, 2012 | Texas Lawyer
Six Tips to Safeguard Your Mobile DevicesMobile devices pose significant risks for sensitive corporate information. As lawyers become more dependent on mobile devices for their practice, they need to be cognizant of the significant security risk these devices present.
By Albert Barsocchini
2 minute read
January 02, 2012 | Legaltech News
Six Tips to Safeguard Your Mobile DevicesResponding to ViaForensics recently released Mobile Risk Security Report, consultant Albert Barsocchini offers six tips to protect your mobile privacy.
By Albert Barsocchini
2 minute read
December 01, 2003 | Legaltech News
Data Collection StandardsEDD methodology is about to change dramatically.
By Albert Barsocchini
4 minute read
January 05, 2012 | Texas Lawyer
Six Tips to Safeguard Your Mobile DevicesMobile devices pose significant risks for sensitive corporate information. As lawyers become more dependent on mobile devices for their practice, they need to be cognizant of the significant security risk these devices present.
By Albert Barsocchini
2 minute read
March 13, 2013 | Legaltech News
We Are in It TogetherAs competition among service providers and law firms heats up, cooperation remains the key to a successful e-discovery engagement. That is why it is important to always be clear about roles and responsibilities between vendor and law firm in this challenging environment. [MORE]
By Albert Barsocchini
4 minute read
January 06, 2012 | Daily Business Review
Six tips to safeguard your mobile devicesMobile devices pose significant risks for sensitive corporate information. As lawyers become more dependent on mobile devices for their practice, they need to be cognizant of the significant security risk these devices present.
By Albert Barsocchini
3 minute read
December 11, 2012 | Legaltech News
Book Review: 'Hacking Web Apps'It has never been easier to initiate a hack with devastating consequences. This is reflected by a number of books including Mike Schema's Hacking Web Apps, which focuses on eight groups of security weaknesses and vulnerabilities most commonly exploited by hackers and more importantly, it explains how to guard against such attacks.
By Albert Barsocchini
3 minute read
Trending Stories