Account

Sign in to access your account and subscription

Cybersecurity

  • We are all "custodians of data." Law firms specifically are stewards of some of the most sensitive information stored and shared; a fact that doesn't elude nefarious cybercriminal syndicates. Below are some of the top cybersecurity risks affecting law firms.

    August 01, 2022Chris Mangano and Edward Keck, Jr.
  • Part One of a Two-Part Series The legal industry today is experiencing a massive uptick in cloud-based discovery. The shift to remote and hybrid work and changing attitudes toward the cloud are significant factors in the movement to widespread adoption of cloud-based discovery. This article explains the momentum behind the rise of cloud-based discovery and the business reasons why companies will have to embrace it.

    July 01, 2022Kenneth Spencer
  • A good incident response program helps firms affected by a cyberattack identify potential damage to their reputation, their regulatory obligations for reporting and issuing notifications, and the potential for future litigation.

    July 01, 2022Larry Gagnon
  • Insurers who write cyber liability policies are well-equipped to manage cyber claims, but what about carriers and adjusters who face such claims under more traditional policies — also known as "Silent Cyber?" This article aims to help non-cyber risk adjusters who may have to oversee such a claim.

    July 01, 2022Barry M. Miller and Elisabeth Gentile
  • A recent opinion in Illinois raises the question of whether spoliating parties should be encouraged to present the following defense at trial: "Ladies and gentlemen of the jury, yes the main evidence of this case has been destroyed, but it's only because my client and my law firm are completely incompetent when it comes to preserving electronic evidence."

    July 01, 2022Eric P. Mandel
  • Two recent Chinese laws — the Data Security Law (DSL) and the Personal Information Protection Law (PIPL) — include provisions aimed at restricting the cross-border transfer of China-based data foreign enforcement and judicial authorities. U.S. courts have not yet addressed whether these data protection and privacy laws could bar the production of documents in civil contexts involving governmental litigants or in criminal proceedings.

    June 01, 2022Jeff Pade and Lindsey Dieselman
  • Truly malicious internal threats can often be treated much like external threats using the tools and backups already in place. But how does a firm proactively identify the softer threats — which may be just as dangerous as the malicious threats and can cripple a firm just as effectively?

    June 01, 2022Brian P. Piatek