NEXT

Judy Selby

Judy Selby

September 26, 2013 | Law.com

The Forgotten Data Breach Weak Spot: Disposal of IT Equipment

The forgotten data breach weak spot: Sophisticated equipment, including scanners and copiers, can have hard drives full of personal health data.

By Judy Selby & Kimberly Wong

5 minute read

November 29, 2012 | New Jersey Law Journal

How To Preserve Data When You Can't Trust Your Adversary

Unfortunately, discovery often begins months, or even years, after a complaint is filed. There is a better way. Steps can be taken to preserve data, prior to the start of discovery, and even prior to the commencement of litigation.

By Judy Selby, Brian Esser and Joshua Rog

7 minute read

December 17, 2012 | Texas Lawyer

Don't Forget About Security for Software

By Judy Selby

6 minute read

December 06, 2012 | Legaltech News

Find the Weakest Software Link Before Hackers Do

Does your risk management plan include vendor-supplied software and applications? Judy Selby, partner at Baker & Hostetler, says that every outsourced application represents a data breach risk — deal with it.

By Judy Selby

6 minute read