September 26, 2013 | Law.com
The Forgotten Data Breach Weak Spot: Disposal of IT EquipmentThe forgotten data breach weak spot: Sophisticated equipment, including scanners and copiers, can have hard drives full of personal health data.
By Judy Selby & Kimberly Wong
5 minute read
November 29, 2012 | New Jersey Law Journal
How To Preserve Data When You Can't Trust Your AdversaryUnfortunately, discovery often begins months, or even years, after a complaint is filed. There is a better way. Steps can be taken to preserve data, prior to the start of discovery, and even prior to the commencement of litigation.
By Judy Selby, Brian Esser and Joshua Rog
7 minute read
December 17, 2012 | Texas Lawyer
Don't Forget About Security for SoftwareBy Judy Selby
6 minute read
December 06, 2012 | Legaltech News
Find the Weakest Software Link Before Hackers DoDoes your risk management plan include vendor-supplied software and applications? Judy Selby, partner at Baker & Hostetler, says that every outsourced application represents a data breach risk deal with it.
By Judy Selby
6 minute read
Trending Stories