We are all "custodians of data." Law firms specifically are stewards of some of the most sensitive information stored and shared; a fact that doesn't elude nefarious cybercriminal syndicates. Below are some of the top cybersecurity risks affecting law firms.
- August 01, 2022Chris Mangano and Edward Keck, Jr.
If savvy law firm attorneys haven't done so yet, they should take this time to adjust their expectations and increase their comfort levels with new technologies, processes, and workflows. Going forward, their clients will expect the emphasis to be on relationships and outcomes, not billable hours.
July 01, 2022David CarnsPart One of a Two-Part Series The legal industry today is experiencing a massive uptick in cloud-based discovery. The shift to remote and hybrid work and changing attitudes toward the cloud are significant factors in the movement to widespread adoption of cloud-based discovery. This article explains the momentum behind the rise of cloud-based discovery and the business reasons why companies will have to embrace it.
July 01, 2022Kenneth SpencerA good incident response program helps firms affected by a cyberattack identify potential damage to their reputation, their regulatory obligations for reporting and issuing notifications, and the potential for future litigation.
July 01, 2022Larry GagnonInsurers who write cyber liability policies are well-equipped to manage cyber claims, but what about carriers and adjusters who face such claims under more traditional policies — also known as "Silent Cyber?" This article aims to help non-cyber risk adjusters who may have to oversee such a claim.
July 01, 2022Barry M. Miller and Elisabeth GentilePartnerships play a key role in today's legal marketplace. Typically, one supplier partners with a law firm and/or corporate legal department to provide…
July 01, 2022David CochranWhile state data privacy legislation is picking up across the U.S., a California bill that recently passed the State Senate and has remained largely under the radar, has some privacy experts raising alarm bells.
July 01, 2022Isha MaratheA recent opinion in Illinois raises the question of whether spoliating parties should be encouraged to present the following defense at trial: "Ladies and gentlemen of the jury, yes the main evidence of this case has been destroyed, but it's only because my client and my law firm are completely incompetent when it comes to preserving electronic evidence."
July 01, 2022Eric P. MandelTwo recent Chinese laws — the Data Security Law (DSL) and the Personal Information Protection Law (PIPL) — include provisions aimed at restricting the cross-border transfer of China-based data foreign enforcement and judicial authorities. U.S. courts have not yet addressed whether these data protection and privacy laws could bar the production of documents in civil contexts involving governmental litigants or in criminal proceedings.
June 01, 2022Jeff Pade and Lindsey DieselmanTruly malicious internal threats can often be treated much like external threats using the tools and backups already in place. But how does a firm proactively identify the softer threats — which may be just as dangerous as the malicious threats and can cripple a firm just as effectively?
June 01, 2022Brian P. Piatek











