Call 855-808-4530 or email GroupSales@alm.com to receive your discount on a new subscription.
From server-filled data centers dotting the countryside to the phones in our pockets (not to mention those in our cars, homes and offices), computers are almost everywhere. In the course of extending this digital realm in which we work and play to business and industry, our most intimate and confidential data has been widely digitized, monetized and shared. It might be said that the value of our personally identifiable information is only now being recognized and the protections appropriate to that value being demanded. Diamonds get armed guards. What does your banking information deserve?
*May exclude premium content
By Mark Sangster
Here are some of the key issues of which law firms and companies need to be aware and steps that should be considered to minimize the risk to keep everyone — and client data — safe.
By Michael Bahar, Sarah Paul, Matt Gatewood and Andrew Weiner
In their consideration of possible worst-case cyber attack scenarios, organizations often focus on the various types of attacks and their relative severity. But, the worst-case scenario is not the breach, it's the reputational damage, regulatory enforcement action, the business interruption, and the inevitable litigation that follows a poorly handled breach from an unprepared organization. Given this reality, it is important to adjust planning assumptions and response scenarios to focus on addressing these drivers of post-breach exposure.
By John Chen
With trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or “patent trolls”), companies that don’t make any products but instead seek royalties by asserting their patents against those who do make products.
By Deb Dobson
Technology allows attorneys to keep informed so they can help their clients understand the potential impact on their company.