Call 855-808-4530 or email GroupSales@alm.com to receive your discount on a new subscription.
For many of us, the term “data breach” conjures up images of a shadowy character in a dark hoodie — a nefarious criminal. But the more we understand about how data breach incidents originate and propagate, the more likely we are to shift focus from outsider hackers to insider threats. Insider threats can be malicious, but often they are accidental. Rather than a shadowy scoundrel, your greater security risk might very well be Alice in the accounting department, who absentmindedly leaves her laptop on the bus.
By Stephen Cole
To comply with the data side of the Outside Counsel Guidelines, firms must have a clear information governance strategy for which the firm’s use of technology systems is foundational.
By Mike Hamilton
The amendments to the Federal Rules of Civil Procedure in 2015 intended to clarify some of the ambiguities that caused inconsistent rulings in e-discovery matters. One such amendment was to Rule 37(e), which seemed to indicate that courts would not levee punitive sanctions without establishing “intent to deprive.” Despite this language, though, courts continue rely on their inherent authority to issue sanctions, meaning organizations must take their preservation obligations seriously.
By Arup Das
Beyond improving efficiency, new advancements in Robotic Process Automation, or RPA, are helping lawyers do more billable work without hiring more people.
By Patrick Smith
Because They Often Possess Valuable Information on a Variety of Companies and Individuals, Law Offices Continue to Be a Favorite Target for Hackers
The DOJ said that two U.S.-based law firms were among the victims of a “complex transnational organized cyber-crime network” that has been taken down.