Call 855-808-4530 or email GroupSales@alm.com to receive your discount on a new subscription.
Professionals in e-discovery and privacy, including lawyers, are hungry for growth opportunities and may be ripe to transition into certain security-centric positions; however, the security job landscape is far more expansive and far less commoditized than ESI or privacy — for now. Part Two provides a road map for how certifications can assist an individual or an organization in reinventing, repurposing, creating or maintaining cybersecurity talents.
In Part One, we delved deep into the value proposition and formidable dominance of the IAPP certification portfolio in privacy as well as ACEDS coupled with Relativity’s certification stack in e-discovery. Certification dominance is much more elusive and the value of certifications far more open to opinion in the information protection and cybersecurity community. Cybersecurity is estimated to become a $170B industry by 2020, eclipsing the projected growth of e-discovery 10 times over. Professionals in e-discovery and privacy, including lawyers, are hungry for growth opportunities and may be ripe to transition into certain security-centric positions; however, the security job landscape is far more expansive and far less commoditized than ESI or privacy — for now.
By Matthew Calcagno
The documents that a firm produces are its greatest asset, yet firms historically have not made sufficient efforts to safeguard those documents from both internal and external threats. Law firms have typically had an open-door approach to document access. This means that anyone in your firm can likely access any document at any time, leaving your firm’s intellectual property entirely unprotected.
By Sean Wieber, Patrick O’Meara and Eric Shinabarger
The BIPA compliance lag has led companies using or collecting biometric information to consider how far back their liability may extend. The Illinois General Assembly, however, did not include an explicit statute of limitations period in BIPA. As a result, the statute of limitations has become one of BIPA’s primary battlegrounds as litigants argue about potential class sizes and damages awards.
By Alan L. Friel
Part Two of a Two-Part Article
Part One of this article, last issue, covered how the CCPA applies to businesses — both in and outside California, the revenue threshold, proposed amendments and other open issues. Part Two continues with the rights that CCPA grants to Californians, the CCPA’s impact on company privacy policies, how other states’ privacy laws compare to the CCPA, exceptions and penalties for violating the Act.
By Christine Simmons and Xiumei Dong
“It’s Not the Hardware You Worry About, It’s the Mistake That Someone Makes That Inadvertently Gives a Bad Actor Access.”
The legal industry has poured significant resources into cybersecurity, leading to huge leaps in progress in the last decade. But there are areas where large and small law firms can do much better in preventing and reacting to data breaches, and the legal sector may risk falling behind other industries. That’s partly because hackers are learning how to circumvent law firm security systems, leading to a continuous game of cat and mouse.