Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
For many of us, the term “data breach” conjures up images of a shadowy character in a dark hoodie — a nefarious criminal. But the more we understand about how data breach incidents originate and propagate, the more likely we are to shift focus from outsider hackers to insider threats. Insider threats can be malicious, but often they are accidental. Rather than a shadowy scoundrel, your greater security risk might very well be Alice in the accounting department, who absentmindedly leaves her laptop on the bus.
Continue reading by getting
started with a subscription.
Privacy Risk Management & Data Minimization
By Therese Craparo and Sarah Bruno
Many organizations — from growing start-ups to mature, well-established companies — are struggling with the new reality of what it means to manage data in an era of digital transformation, exponential data growth, and expanding regulatory regimes focusing on data management and minimization.
Digital Dibs: Rival Views of Generative AI Copyrights
By Greg Moreman
GAI platforms like ChatGPT and OpenAI often require very little human input, shattering this legal landscape’s framework by posing a simple question: Who authored the material? We’ll explore how two countries are answering this question in different ways.
Empowering Legal Professionals: Navigating AI Solutions for Efficiency and Data Security
By Michael T. Murray and Tony Donofrio
Integrating AI tools into legal practice without compromising the security of sensitive client information is a paramount concern. In this article, we’ll examine how AI is revolutionizing certain aspects of legal work, while offering best practices for employing these technologies and providing guidance for legal professionals in selecting the right AI products and service providers.
Pitfalls In Personal Device Data Collection
By Marjorie Peerce and Marguerite O’Brien
The increasing frequency of “bring your own device” policies creates serious implications for subpoena recipients and litigants to ensure compliance with discovery demands. And courts across the country consider such personal mobile data fair game. To avoid pitfalls —and sanctions — counsel must take proactive steps to ensure proper preservation and collection of personal mobile data and verify that clients comply.