By Corey Omer and Laila Paszti, Davies | October 18, 2021
While the amended Private Sector Act, the GDPR and the CCPA share many key features, they differ in important respects. Here's how organizations can determine whether they are subject to the Act and formulate a plan to bridge any gaps.
By David P. Saunders, McDermott Will & Emery | October 8, 2021
A lesson learned by young lawyers everywhere is that internal, corporate investigations can be, and frequently are, privileged. However, it is difficult to square that concept with the recent spate of federal court opinions that have concluded that cybersecurity forensic reports generally are not privileged.
By David Kalat, BRG | October 4, 2021
Early computers were not only mammoth machines, they weren't very user-friendly. This month's history of cybersecurity examines how the relationship between Man and Machine was reimagined, starting with Xerox's Alto.
By Gina Taranto, ProSearch | September 23, 2021
What is an investigator, attorney, or other discovery professional to do when private information requires protection today, during a current litigation or investigation happening now, in the absence of clear guidance?
By Tim Dinsmore, Appurity | September 21, 2021
With the cybercriminal community rubbing their hands together in anticipation of further soft targets, it's crucial to make sure your organization takes the necessary steps to secure all devices.
By Cynthia Cole, Brooke Chatterton and Natalie Sanders, Baker Botts | September 13, 2021
Any tech companies or marketing firms who rely on harvested data need to consider the implications of these updates on their own products and business plans. And these privacy features are likely the first step in a long path of consumers taking more control of their data.
By Victoria Hudgins | September 9, 2021
In less than two months, China's Personal Information Protection Law (PIPL) is set to go into effect. Lawyers point to critical steps companies should take to protect their data processing and collecting practices.
By David Kalat, BRG | September 1, 2021
The man who knew more about Pacific Telephone's operations than the company itself: This month's history of cybersecurity and privacy explores the story of Jerry Schneider and his early fraud techniques.
By Mark Sangster, eSentire | August 23, 2021
In response to the worst period on record for cyber attacks, the ABA published Formal Opinion 498 to address practicing law outside of the traditional brick-and-mortar office environment. Here's how you can operate a secure virtual law practice.
By Emil Sayegh, Ntirety | August 13, 2021
Each component of a cyber defense system (the tactics) must serve the higher-level strategy and the strategy must drive what protections are put into action in the first place. This is where the concept of multi-level, comprehensive security takes form.
Presented by BigVoodoo
Join the industry's top owners, investors, developers, brokers & financiers at THE MULTIFAMILY EVENT OF THE YEAR!
Law.com celebrates the California law firms and legal departments driving the state's dynamic legal landscape.
The Texas Lawyer honors attorneys and judges who have made a remarkable difference in the legal profession in Texas.
When you come to work for New Jersey Judiciary you will join an 8500-member strong TEAM that operates with the highest standards of independ...
When you come to work for New Jersey Judiciary you will join an 8500-member strong team that operates with the highest standards of independ...
CAREER OPPORTUNITYUNITED STATES DISTRICT COURT DISTRICT OF CONNECTICUT VACANCY ANNOUNCEMENT - USDC-CT 24-14 POSITION: Pro Se Law Clerk OPENI...