NEXT

Strategy

Strategy

April 18, 2017 | Legaltech News

Got a Negative Online Review? First Things First: Turn Off Your Attorney

It happened. Some current or former client had the gall to write something less than flattering about you online. What do you do? The first thing to do, and this can be the hardest thing for attorneys, is to turn off your attorney. Feedback can be hard to take.

By Dan Lear, Cybersecurity Law & Strategy

12 minute read

April 17, 2017 | Legaltech News

Information Governance: Law Firms' Cybersecurity Weak Spot

Perimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.

By Ian Raine, Cybersecurity Law & Strategy

18 minute read

April 14, 2017 | Corporate Counsel

The EU's General Data Protection Regulation (GDPR)

Considerations for Corporate Counsel and Discovery Teams: With the EU's General Data Protection Regulation (GDPR) set to take effect in May 2018, the serious implications for corporate legal counsel and e-discovery teams are difficult to deny.

By Ryan Costello, Commercial Leasing Law & Strategy

14 minute read

April 14, 2017 | Corporate Counsel

The Internal Audit Function

The International Professional Practices Framework released last year by the IIA is intended to provide guidance for internal auditors, by seeking to focus on core principles. The framework identifies 10 core principles that describe or guide what an effective internal audit function should focus upon and to what it should adhere.

By William Floyd, Commercial Leasing Law & Strategy

14 minute read

April 13, 2017 | Legaltech News

Using Computer Forensics to Investigate Employee Data Theft

When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft-of-IP analysis in order to preserve electronic data and uncover important evidence.

By Timothy M. Opsitnick, Joseph M. Anguilano and Trevor B. Tucker, JURINNOV, Cybersecurity Law & Strategy

19 minute read

March 10, 2017 | Corporate Counsel

What You Need to Know to Get Started with Privacy Shield Certification

If your company maintains operations in the European Union or is U.S. based but obtaining personal data from European citizens, you will need to strongly consider obtaining certification under the new Privacy Shield framework. Certification began in August 2016, and will make compliance with EU privacy laws when transferring data to the U.S. possible for the immediate future.

By David F. Katz, Cybersecurity Law & Strategy

16 minute read

January 12, 2017 | Legaltech News

Is Your Data Breach Response Plan Good Enough? Stress Test It

As the chances of a data breach incident increase, savvy businesses have invested time and thought in a response plan. But plans never survive first contact with the enemy.

By Eric Hodge and Rich Bloomberg, IDT911, Cybersecurity Law & Strategy

16 minute read

July 25, 2005 | National Law Journal

How best to respond to subpoenas for e-mail

For clients who are served a subpoena to produce e-mail records, the burden involved in locating the relevant e-mails can be quite significant if they have not properly prepared for this eventuality.

By Anthony SanchezE-Discovery Law Strategy

11 minute read