Michael Smith and Mike Paul
This article discusses what to look for in a cloud service provider and other issues that will help determine if moving to the cloud is the right move for your firm.
IP theft is not limited to kingpins of business. Even if your organization has never appeared in the headlines, you cannot rest easy that no one is interested in acquiring your know-how. In fact, analysis the results of our survey for the 2018 Netwrix IT Risks Report reveals that small and medium organizations are actually more vulnerable to IP theft and cyber espionage than enterprises.
The issue of digital security and privacy should be a paramount concern to modern court reporters just as it is to their attorney clients. Yet their biggest risk remains the same as everyone else’s: believing it won’t happen to them.
Consistent With the Cliché That “Everything’s Bigger In Texas,” the Texas Legislature Has Introduced Not One, But Two Separate Bills Relating to the Privacy of Personal Information
The TPPA is arguably the less onerous of the two bills, although you might not necessarily realize it at first blush, given the broad way it defines “personal identifying information” (PII).
David G. Ries
Effective cybersecurity requires an ongoing, risk-based, comprehensive process that addresses people, policies and procedures, and technology, including training. Effective security also requires an understanding that security is everyone’s responsibility and constant security awareness by all users of technology.
Craig A. Newman and Kade N. Olsen
The Conclusion of the “Transitional Period” for New York’s Cybersecurity Regulation Marks the Beginning, Rather Than the End, of an Organization’s Compliance Efforts
Financial institutions will have to certify annually that their internal controls and cybersecurity practices remain up to snuff. And now that the transitional periods for implementing the cyber regulation have passed, covered institutions will need to certify that they have complied with each provision.
After reading the new Technology Assisted Review (TAR) Guidelines from EDRM, it is clear that the evolution of the underlying technology in TAR solutions is reshaping the role of the subject matter expert (SME).
Erin Hennessy, Annie Allison and Logan Kotler
Copyright, Fortnite and the Ability to Protect How You Shake Your Groove Thing
The U.S. Supreme Court just crashed the copyright world’s latest dance party — stepping on the toes of a soiree of copyright infringement lawsuits against videogame developer Epic Games, the creator of Fortnite.
A Roundtable Discussion
Experts share their experience and insight on the evolving acceptance and use of AI and advanced analytics tools for e-discovery — and beyond.
In an environment of moving targets, it seems unimaginable that insurance against cybersecurity attacks can be robust enough to provide real protection. There are many types of risks involved, and some include physical damage to property.
Accounting and Financial Planning for Law Firms The Bankruptcy Strategist Business Crimes Bulletin Commercial Leasing Law & Strategy Cybersecurity Law & Strategy Entertainment Law & Finance The Intellectual Property Strategist Marketing the Law Firm New York Real Estate Law Reporter