Features
A Look Behind, A Look Ahead: Part Two - E-Discovery
Part Two of a Two-Part Article Cybersecurity Law & Strategy partnered with our ALM sibling Legaltech News to ask cybersecurity and e-discovery experts what they thought the key trends of 2019 and what they expect to see in 2020. Part Two looks at e-discovery.
Features
The Threat of Ransomware 2.0 for Law Practices
During the past few months, there has been a significant paradigm shift in the cybersecurity world. Threat actors from Russia, in particular, have significantly enhanced their capabilities to target individual businesses and Managed Service Providers (MSPs) or IT companies. It is critical that lawyers, their firms and the companies they serve be aware of these threats and take the appropriate measures to proactively secure their own — and their clients' — sensitive and private information.
Features
Law Firms Adopt a Legal Operations Perspective
Law Firms Are Following the Lead of Their Corporate Clients In Implementing Legal Operations Methodologies Legal operations as a discipline within corporate legal departments is receiving more attention, funding and staffing over the last few years.
Features
More Regulation, Stronger Investigations and Home Tech Devices Concerns to Come in 2020, New Gibson Dunn Report Warns
On Data Privacy Day last month, Gibson Dunn released the eighth edition of its United States Cybersecurity and Data Privacy Outlook and Review. The report details trends that the privacy industry saw in 2019 from a legislative, regulatory and judicial perspective.
Features
GDPR-Based Objections to U.S. Discovery Requests: 2019 Year in Review
U.S. civil litigants faced with an obligation to produce "personal data" protected by GDPR can find themselves on the horns of a serious dilemma. Initial rulings addressing the tension between the broad scope of data protected by GDPR and the similarly broad scope of discovery under U.S. law revealed substantial skepticism that complying with a U.S. discovery request would expose parties to significant enforcement risk in the EU. This article takes a look at what arguments parties put forth in the past year, and make a few suggestions for how litigants can avoid violating one jurisdiction's law to satisfy another's courts.
Features
Data Breaches: Adding a New Layer to the Risk of Legal Malpractice
Those in the legal profession are not immune to a data breach. What's more, ethical obligations put lawyers and law firms at even greater risk for significant business, financial and reputational harm should they experience a cyberattack. Attorneys have both an ethical and legal duty to take reasonable steps to protect their clients' personal sensitive data against a cyberattack, or face serious ramifications.
Features
Legal Tech: E-Discovery Lessons from the Presidential Impeachment Proceedings
Whether we realize it or not, e-discovery has found a central place in the news during the Trump campaign and presidency, and in particular, during the impeachment proceedings.
Features
A Look Behind, A Look Ahead: Part 1 - Cybersecurity
Cybersecurity Law & Strategy partnered with our ALM sibling Legaltech News to ask cybersecurity and e-discovery experts what they thought the key trends were in 2019 and what they expect to see in 2020.
Features
Data Privacy: Building Compliant and Adaptable Systems
Rather than trying to institute changes to comply with every new privacy law as it emerges, a better approach is to view data privacy as an overall framework and adopt a holistic response to compliance with the built-in flexibility to constantly adapt to an ever-changing legal landscape.
Features
Cybersecurity Skills Update for 2020
The demand for capable skilled professionals and team players in the information security industry is increasing. For those gaining skills to work in the industry for the first time, the challenge remains to hit the ground running with a position and, better, with a career path. Yet no career path in this industry will sidestep an ongoing foothold in the classroom — onsite or virtual.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- Mixed Ruling in Jefferson Starship Band Name SuitWhat's in a rock band's name? Plenty, if you are talking about Jefferson Starship, which goes back more than 40 years, has had more than 30 members and was born from the 1960s psychedelic rock band Jefferson Airplane.Read More ›
