Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Five Takeaways from Recent Cybersecurity Developments by Colorado and the SEC Image

Five Takeaways from Recent Cybersecurity Developments by Colorado and the SEC

Brian Neil Hoffman

Colorado recently adopted a new law expanding companies' obligations in the event of a cybersecurity incident, and establishing new data security and disposal obligations. Recent announcements by the SEC likewise emphasize important responsive points for both companies and their personnel in the wake of an incident. Five key takeaways from these developments are highlighted in this article.

Features

Protecting Privilege Before and After a Cyber Breach Image

Protecting Privilege Before and After a Cyber Breach

Robert W. Anderson & Eric B. Levine

Critical to any counsel working to prevent a cyber attack or respond to a successful cyber intrusion is an understanding of why and how to properly utilize both attorney-client and work-product privilege.

Features

Is Gmail's New Ephemeral Messaging Service a Threat to Data Retention? Image

Is Gmail's New Ephemeral Messaging Service a Threat to Data Retention?

Rhys Dipshan

Despite some potential problems with widespread use of Gmail's 'confidential mode,' the new ephemeral messaging function can be easily managed from an information governance perspective.

Features

Legal Tech: Approaches and Considerations for Discovery Cost Minimization and Recovery Image

Legal Tech: Approaches and Considerations for Discovery Cost Minimization and Recovery

John Koss & Daniel Pelc

The costs of litigation increase with ever more potentially responsive data, litigation technology options, and a truly global reach in the context of much litigation. In response, law firms must continue to consider viable approaches to broaching discussions surrounding the recovery of these costs both within the firm and, more importantly, with law firm clients.

Features

Pitching Your Cybersecurity Case to Law Enforcement Agencies Image

Pitching Your Cybersecurity Case to Law Enforcement Agencies

Steven A. Cash & Naju R. Lathia

This article focuses on the unique issues that arise in a specific but increasingly common scenario: when your client is the victim of a cybercrime.

Features

Case Study: How Momkus McCluskey Virtualized Its IT for Better Security and Productivity  Image

Case Study: How Momkus McCluskey Virtualized Its IT for Better Security and Productivity 

Jennifer Friedland

Whatever direction we went with our IT, we wanted to make sure we would be following the absolute best practices from a security perspective. I needed to know that our data would be safe, secure, as well as fully backed up in case something went wrong.

Features

Legal Tech: A Deep Dive Into the Tech Upgrades in Thomson Reuters' Westlaw Edge Image

Legal Tech: A Deep Dive Into the Tech Upgrades in Thomson Reuters' Westlaw Edge

Zach Warren

The new technology offering from Thomson Reuters features a retooled warning system for questionable law, an expanded litigation analytics offering, and more.

Features

Book Review: Cybersecurity Program Development for Business: The Essential Planning Guide Image

Book Review: Cybersecurity Program Development for Business: The Essential Planning Guide

Adam Schlagman

While many business owners and executives understand that a data security problem/need exists, they do not have a baseline fluency in the concepts and alphabet soup that comprise the language of digital information security. To this extent, Chris Moschovitis' new book is an effective cybersecurity primer for the management community.

Features

Blockchain and GDPR — Frenemies? Image

Blockchain and GDPR — Frenemies?

Justin Hectus & Kristy Sambor

In a nutshell, GDPR mandates that individuals have access and control over the use and maintenance of their data in certain circumstances, while the foundation of blockchain relies on the immutability of data. On the surface, these concepts seem in direct conflict with each other. This article discusses the points where GDPR and blockchain share common ground, where conflicts may exist and possible approaches for mitigating those conflicts.

Features

Why Encryption Is the Key to Ensure Data Privacy in the Cloud Image

Why Encryption Is the Key to Ensure Data Privacy in the Cloud

Linus Chang

At both a personal and corporate level, there are huge gains to be made in protecting against data breaches. The fact is that well-implemented client-side encryption — where the corporate user keeps their own key rather than entrusting a third party to guard their sensitive information — is the only sure way to guarantee data privacy when storing data on other people's servers.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Disconnect Between In-House and Outside Counsel
    'Disconnect Between In-House and Outside Counsel is a continuation of the discussion of client expectations and the disconnect that often occurs. And although the outside attorneys should be pursuing how inside-counsel actually think, inside counsel should make an effort to impart this information without waiting to be asked.
    Read More ›
  • Holders of Unredeemed Gift Cards Denied Bankpruptcy Priority
    For some time now, the brick and mortar side of the retail industry has been in financial distress. In 2015 and 2016 alone, brand-name ­companies such as Sports Authority, RadioShack, Aéropostale, American Apparel, Eastern Mountain Sports and City Sports sought bankruptcy protection. A common question in these cases is how to treat holders of unredeemed gift cards. Are they near the back of the line with other general unsecured creditors, or are they entitled to “priority” payment status under the Bankruptcy Code?
    Read More ›