Features
Protecting Privilege Before and After a Cyber Breach
Critical to any counsel working to prevent a cyber attack or respond to a successful cyber intrusion is an understanding of why and how to properly utilize both attorney-client and work-product privilege.
Features
Is Gmail's New Ephemeral Messaging Service a Threat to Data Retention?
Despite some potential problems with widespread use of Gmail's 'confidential mode,' the new ephemeral messaging function can be easily managed from an information governance perspective.
Features
Legal Tech: Approaches and Considerations for Discovery Cost Minimization and Recovery
The costs of litigation increase with ever more potentially responsive data, litigation technology options, and a truly global reach in the context of much litigation. In response, law firms must continue to consider viable approaches to broaching discussions surrounding the recovery of these costs both within the firm and, more importantly, with law firm clients.
Features
Pitching Your Cybersecurity Case to Law Enforcement Agencies
This article focuses on the unique issues that arise in a specific but increasingly common scenario: when your client is the victim of a cybercrime.
Features
Case Study: How Momkus McCluskey Virtualized Its IT for Better Security and Productivity
Whatever direction we went with our IT, we wanted to make sure we would be following the absolute best practices from a security perspective. I needed to know that our data would be safe, secure, as well as fully backed up in case something went wrong.
Features
Legal Tech: A Deep Dive Into the Tech Upgrades in Thomson Reuters' Westlaw Edge
The new technology offering from Thomson Reuters features a retooled warning system for questionable law, an expanded litigation analytics offering, and more.
Features
Book Review: Cybersecurity Program Development for Business: The Essential Planning Guide
While many business owners and executives understand that a data security problem/need exists, they do not have a baseline fluency in the concepts and alphabet soup that comprise the language of digital information security. To this extent, Chris Moschovitis' new book is an effective cybersecurity primer for the management community.
Features
Blockchain and GDPR — Frenemies?
In a nutshell, GDPR mandates that individuals have access and control over the use and maintenance of their data in certain circumstances, while the foundation of blockchain relies on the immutability of data. On the surface, these concepts seem in direct conflict with each other. This article discusses the points where GDPR and blockchain share common ground, where conflicts may exist and possible approaches for mitigating those conflicts.
Features
Why Encryption Is the Key to Ensure Data Privacy in the Cloud
At both a personal and corporate level, there are huge gains to be made in protecting against data breaches. The fact is that well-implemented client-side encryption — where the corporate user keeps their own key rather than entrusting a third party to guard their sensitive information — is the only sure way to guarantee data privacy when storing data on other people's servers.
Features
This is Not Your Father's Cloud (Part Two)
<b><i>Part Two of a Two-Part Article</b></i><p>In Part One of this article last month, we began a discussion designed to demystify the hesitations behind cloud security and analyzed the fast-growing transformation to a range of newer technical approaches with important consequences for legal practice. This month we continue the discussion by tackling the security and legal implications of the mass transformation of enterprise IT to cloud services from leading providers such as AWS and Azure.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Don't Sleep On Prohibitions on the Assignability of LeasesAttorneys advising commercial tenants on commercial lease documents should not sleep on prohibitions or other limitations on their client's rights to assign or transfer their interests in the leasehold estate. Assignment and transfer provisions are just as important as the base rent or any default clauses, especially in the era where tenants are searching for increased flexibility to maneuver in the hybrid working environment where the future of in-person use of real estate remains unclear.Read More ›
- Developments in Distressed LendingRecently, in two separate cases, secured lenders have received, as part of their adequate protection package, the right to obtain principal paydowns during a bankruptcy case.Read More ›
