NEXT

Cybersecurity Law

Cybersecurity Law

April 18, 2017 | Legaltech News

Got a Negative Online Review? First Things First: Turn Off Your Attorney

It happened. Some current or former client had the gall to write something less than flattering about you online. What do you do? The first thing to do, and this can be the hardest thing for attorneys, is to turn off your attorney. Feedback can be hard to take.

By Dan Lear, Cybersecurity Law & Strategy

12 minute read

April 17, 2017 | Legaltech News

Information Governance: Law Firms' Cybersecurity Weak Spot

Perimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.

By Ian Raine, Cybersecurity Law & Strategy

18 minute read

April 13, 2017 | Legaltech News

Using Computer Forensics to Investigate Employee Data Theft

When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft-of-IP analysis in order to preserve electronic data and uncover important evidence.

By Timothy M. Opsitnick, Joseph M. Anguilano and Trevor B. Tucker, JURINNOV, Cybersecurity Law & Strategy

19 minute read

March 10, 2017 | Corporate Counsel

What You Need to Know to Get Started with Privacy Shield Certification

If your company maintains operations in the European Union or is U.S. based but obtaining personal data from European citizens, you will need to strongly consider obtaining certification under the new Privacy Shield framework. Certification began in August 2016, and will make compliance with EU privacy laws when transferring data to the U.S. possible for the immediate future.

By David F. Katz, Cybersecurity Law & Strategy

16 minute read

January 12, 2017 | Legaltech News

Is Your Data Breach Response Plan Good Enough? Stress Test It

As the chances of a data breach incident increase, savvy businesses have invested time and thought in a response plan. But plans never survive first contact with the enemy.

By Eric Hodge and Rich Bloomberg, IDT911, Cybersecurity Law & Strategy

16 minute read