By Gina Taranto, ProSearch | September 23, 2021
What is an investigator, attorney, or other discovery professional to do when private information requires protection today, during a current litigation or investigation happening now, in the absence of clear guidance?
By Tim Dinsmore, Appurity | September 21, 2021
With the cybercriminal community rubbing their hands together in anticipation of further soft targets, it's crucial to make sure your organization takes the necessary steps to secure all devices.
By Cynthia Cole, Brooke Chatterton and Natalie Sanders, Baker Botts | September 13, 2021
Any tech companies or marketing firms who rely on harvested data need to consider the implications of these updates on their own products and business plans. And these privacy features are likely the first step in a long path of consumers taking more control of their data.
By Victoria Hudgins | September 9, 2021
In less than two months, China's Personal Information Protection Law (PIPL) is set to go into effect. Lawyers point to critical steps companies should take to protect their data processing and collecting practices.
By David Kalat, BRG | September 1, 2021
The man who knew more about Pacific Telephone's operations than the company itself: This month's history of cybersecurity and privacy explores the story of Jerry Schneider and his early fraud techniques.
By Mark Sangster, eSentire | August 23, 2021
In response to the worst period on record for cyber attacks, the ABA published Formal Opinion 498 to address practicing law outside of the traditional brick-and-mortar office environment. Here's how you can operate a secure virtual law practice.
By Emil Sayegh, Ntirety | August 13, 2021
Each component of a cyber defense system (the tactics) must serve the higher-level strategy and the strategy must drive what protections are put into action in the first place. This is where the concept of multi-level, comprehensive security takes form.
By David Kalat, BRG | August 4, 2021
Trying to pass legislation governing the prosecution of computer crimes was a rocky road before the Computer Fraud and Abuse Act, as this month's history of cybersecurity and privacy explains.
By David J. Oberly, Blank Rome | July 7, 2021
With regulatory and litigation issues surrounding virtual try-on technology, brands should take proactive steps to build out their biometric privacy compliance programs in order to mitigate their liability exposure. Fortunately, there are several key best practices they can implement today.
By David Kalat, BRG | July 6, 2021
Not all collections are created equal. This month's history of cybersecurity explores how SafeBack and the forensic tools that followed it tackled collecting electronic evidence to maintain its reliability and validity.
Presented by BigVoodoo
The Daily Report is honoring those attorneys and judges who have made a remarkable difference in the legal profession.
Consulting Magazine identifies consultants that have the biggest impact on their clients, firms and the profession.
The National Law Journal Elite Trial Lawyers recognizes U.S.-based law firms performing exemplary work on behalf of plaintiffs.
Health Law Associate CT Shipman is seeking an associate to join our national longstanding health law practice. Candidates must have t...
Shipman & Goodwin LLP is seeking two associates to expand our national commercial real estate lending practice. Candidates should have ...
Associate attorney position at NJ Immigration Law firm: Leschak & Associates, LLC, based in Freehold, NJ, is looking for a full time ass...
MELICK & PORTER, LLP PROMOTES CONNECTICUT PARTNERS HOLLY ROGERS, STEVEN BANKS, and ALEXANDER AHRENS