April 18, 2017 | Legaltech News
Got a Negative Online Review? First Things First: Turn Off Your AttorneyIt happened. Some current or former client had the gall to write something less than flattering about you online. What do you do? The first thing to do, and this can be the hardest thing for attorneys, is to turn off your attorney. Feedback can be hard to take.
By Dan Lear, Cybersecurity Law & Strategy
12 minute read
April 17, 2017 | Legaltech News
Information Governance: Law Firms' Cybersecurity Weak SpotPerimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.
By Ian Raine, Cybersecurity Law & Strategy
18 minute read
April 13, 2017 | Legaltech News
Using Computer Forensics to Investigate Employee Data TheftWhen suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft-of-IP analysis in order to preserve electronic data and uncover important evidence.
By Timothy M. Opsitnick, Joseph M. Anguilano and Trevor B. Tucker, JURINNOV, Cybersecurity Law & Strategy
19 minute read
March 10, 2017 | Corporate Counsel
What You Need to Know to Get Started with Privacy Shield CertificationIf your company maintains operations in the European Union or is U.S. based but obtaining personal data from European citizens, you will need to strongly consider obtaining certification under the new Privacy Shield framework. Certification began in August 2016, and will make compliance with EU privacy laws when transferring data to the U.S. possible for the immediate future.
By David F. Katz, Cybersecurity Law & Strategy
16 minute read
January 12, 2017 | Legaltech News
Is Your Data Breach Response Plan Good Enough? Stress Test ItAs the chances of a data breach incident increase, savvy businesses have invested time and thought in a response plan. But plans never survive first contact with the enemy.
By Eric Hodge and Rich Bloomberg, IDT911, Cybersecurity Law & Strategy
16 minute read
Trending Stories