Call 855-808-4530 or email GroupSales@alm.com to receive your discount on a new subscription.
In 2014, now a decade ago in cyber-time, I interviewed TecSec CEO and security specialist, Jay Wack. I asked about the security of the cloud, which at the time was starting to transform the storage of electronic information. “There’s really no such thing as the cloud,” Mr. Wack told me, “there are only other people’s computers.” I was not entirely surprised by his answer. He had a snappy way of coming to conclusions. In this case I said, “Oh, something like time-sharing in the old days.” This may have been true at first; but it is now worth some investigation if the present threat environment today demands a secure cloud. Even then, Jay Wack warned: “You cannot secure the network, only the data.”
By Stephen Cole
To comply with the data side of the Outside Counsel Guidelines, firms must have a clear information governance strategy for which the firm’s use of technology systems is foundational.
By Mike Hamilton
The amendments to the Federal Rules of Civil Procedure in 2015 intended to clarify some of the ambiguities that caused inconsistent rulings in e-discovery matters. One such amendment was to Rule 37(e), which seemed to indicate that courts would not levee punitive sanctions without establishing “intent to deprive.” Despite this language, though, courts continue rely on their inherent authority to issue sanctions, meaning organizations must take their preservation obligations seriously.
By Arup Das
Beyond improving efficiency, new advancements in Robotic Process Automation, or RPA, are helping lawyers do more billable work without hiring more people.
By Patrick Smith
Because They Often Possess Valuable Information on a Variety of Companies and Individuals, Law Offices Continue to Be a Favorite Target for Hackers
The DOJ said that two U.S.-based law firms were among the victims of a “complex transnational organized cyber-crime network” that has been taken down.